#cyber-espionage

[ follow ]
Information security
fromThe Hacker News
1 day ago

Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control

MystRodX is a stealthy, flexible C++ backdoor that uses layered encryption, passive wake-up triggers via DNS/ICMP, and modular capabilities for remote control and data capture.
fromThe Hacker News
5 days ago

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Russia-linked APT29 ran a watering hole campaign redirecting visitors to attacker-controlled domains to trick users into authorizing devices via Microsoft's device code authentication flow.
#china
fromTheregister
1 week ago

China's Salt Typhoon gang still present in critical networks

China's Salt Typhoon cyber espionage campaign has targeted critical industries since at least 2019, breaching telecom networks and maintaining long-term access to routers and infrastructure.
fromNextgov.com
1 week ago

Salt Typhoon hackers targeted over 80 countries, FBI says

Salt Typhoon conducted a multi-year global espionage campaign against telecoms and other networks, targeting phone calls of senior U.S. officials and roughly 80 nations.
fromThe Hacker News
1 month ago

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

Russian aerospace and defense industries face cyber espionage through EAGLET backdoor in Operation CargoTalon.
fromThe Hacker News
1 month ago

Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

The threat actor leveraged combinations of sophisticated and stealthy techniques creating multilayered attack kill chains to facilitate access to restricted and segmented network assets within presumed to be isolated environments.
Information security
#cybersecurity
Tech industry
fromThe Hacker News
2 months ago

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

China-linked Salt Typhoon actors are targeting telecommunications providers for cyber espionage using critical software vulnerabilities.
Roam Research
fromIT Pro
2 months ago

A sneaky cyber espionage campaign is exploiting IoT devices and home office routers - here's what you need to know

A cyber espionage network called 'LapDogs' has compromised thousands of devices globally, primarily targeting the US and Asia.
fromIT Pro
2 months ago
Roam Research

A sneaky cyber espionage campaign is exploiting IoT devices and home office routers - here's what you need to know

fromWIRED
1 month ago

How China's Patriotic 'Honkers' Became the Nation's Elite Cyber Spies

Early Chinese hackers formed cooperative groups that evolved into key components of the state’s espionage apparatus.
fromSecuritymagazine
1 month ago

Threat Actor Targeting Indian Defense Sector

APT36's focus on Linux-specific systems, particularly those used in government infrastructure, reinforces that no operating system is off-limits to nation-state attackers. This kind of multi-layered phishing attack highlights how threat actors are constantly evolving their tactics to quietly bypass defenses and exploit user trust.
Privacy professionals
[ Load more ]