New and expanding China-backed threat groups are pushing a broader cyber strategy ... servers that are used to route traffic and conceal espionage operations. These networks are similar to ...
Unlike some cases of cyber espionage, the ostensible goals of this operation appear to have had national security aims in mind, as opposed to many known past cases of Chinese cyber espionage, which ...
The surge in foreign cyber threats demands a fundamental shift in cybersecurity strategies. Organizations and governments must prioritize cyber hygiene, implement robust mitigation practices, and ...
China’s cyber espionage operations continue to become more aggressive amid the increasing use of emerging technologies like artificial intelligence (AI) to help carry out attacks, according to a ...
Mandiant’s latest research, following an in-depth investigation since mid-2024, reveals that UNC3886 has been compromising end-of-life Juniper MX routers by deploying malware that bypasses ...
Ghostwriter, a cyber-espionage group linked to the Belarusian government, has evolved its attack strategies. SentinelLABS found that the group now uses Excel spreadsheets as phishing lures, embedding ...
The recent suit puts a spotlight on communications tools such as Slack and Microsoft Teams, including vulnerability to ...
But as AI diffusion grows, so too do the risks associated with its misuse – particularly by nation state actors engaged in espionage, cyber attacks, and supply chain compromise. However ...
APT27, also known as Silk Typhoon, Emissary Panda and LuckyMouse, has been identified in several cyber espionage campaigns in the past. In 2021, the group was linked to attacks exploiting ...
In under three months, the Philippines has ramped up its counter-intelligence efforts, leading to a raft of arrests and investigations into suspected espionage activities in the country.