China

Chinese APT’s Adversary-in-the-Middle Tool Dissected

Chinese APT’s Adversary-in-the-Middle Tool Dissected 2025-05-01 at 14:18 By Ionut Arghire ESET has analyzed Spellbinder, the IPv6 SLAAC spoofing tool Chinese APT TheWizards uses to deploy its WizardNet backdoor. The post Chinese APT’s Adversary-in-the-Middle Tool Dissected appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

Chinese APT’s Adversary-in-the-Middle Tool Dissected Read More »

SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers

SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers 2025-05-01 at 11:32 By Eduard Kovacs SentinelOne has shared some information on the types of threat actors that have targeted the security firm recently. The post SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

SentinelOne Targeted by North Korean IT Workers, Ransomware Groups, Chinese Hackers Read More »

China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America

China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America 2025-04-29 at 18:02 By Kevin Townsend As Xi Jinping advances his vision for China’s dominance by 2049, cybersecurity experts warn that connected technologies—like EV batteries—may quietly serve as tools of influence, espionage, and disruption. The post China’s Secret Weapon? How EV Batteries Could

React to this headline:

Loading spinner

China’s Secret Weapon? How EV Batteries Could be Weaponized to Disrupt America Read More »

Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack 

Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack  2025-04-21 at 22:47 By Ryan Naraine Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.” The post Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack  appeared first

React to this headline:

Loading spinner

Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack  Read More »

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects 2025-04-17 at 19:40 By Ionut Arghire Minh Phuong Ngoc Vong pleaded guilty to defrauding US companies of roughly $1 million in a fake IT worker scheme. The post Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects Read More »

Chinese APT Mustang Panda Updates, Expands Arsenal

Chinese APT Mustang Panda Updates, Expands Arsenal 2025-04-17 at 14:05 By Ionut Arghire The Chinese state-sponsored group Mustang Panda has used new and updated malicious tools in a recent attack. The post Chinese APT Mustang Panda Updates, Expands Arsenal appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Chinese APT Mustang Panda Updates, Expands Arsenal Read More »

MITRE Hackers’ Backdoor Has Targeted Windows for Years

MITRE Hackers’ Backdoor Has Targeted Windows for Years 2025-04-17 at 12:02 By Ionut Arghire Windows versions of the BrickStorm backdoor that the Chinese APT used in the MITRE hack last year have been active for years. The post MITRE Hackers’ Backdoor Has Targeted Windows for Years appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

MITRE Hackers’ Backdoor Has Targeted Windows for Years Read More »

Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild

Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild 2025-04-16 at 14:55 By Ionut Arghire In recent attacks, the state-sponsored backdoor BPFDoor is using a controller to open a reverse shell and move laterally. The post Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Enhanced Version of ‘BPFDoor’ Linux Backdoor Seen in the Wild Read More »

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games 2025-04-15 at 14:01 By Associated Press China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin. The post China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games Read More »

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

China Admitted to US That It Conducted Volt Typhoon Attacks: Report 2025-04-11 at 13:14 By Eduard Kovacs In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure. The post China Admitted to US That It Conducted Volt Typhoon Attacks: Report appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Read More »

Undocumented Remote Access Backdoor Found in Unitree Go1 Robot Dog

Undocumented Remote Access Backdoor Found in Unitree Go1 Robot Dog 2025-04-01 at 22:17 By Ryan Naraine The undocumented tunnel allows remote control all robot dogs on the tunnel network and use the vision cameras to see through their eyes. The post Undocumented Remote Access Backdoor Found in Unitree Go1 Robot Dog appeared first on SecurityWeek.

React to this headline:

Loading spinner

Undocumented Remote Access Backdoor Found in Unitree Go1 Robot Dog Read More »

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices 2025-03-31 at 16:12 By Zeljka Zorz CISA has released indicators of compromise, detection signatures, and updated mitigation advice for rooting out a newly identified malware variant used by the attackers who breached Ivanti Connect Secure VPN appliances in December 2024 by exploiting the

React to this headline:

Loading spinner

CISA reveals new malware variant used on compromised Ivanti Connect Secure devices Read More »

China-linked FamousSparrow APT group resurfaces with enhanced capabilities

China-linked FamousSparrow APT group resurfaces with enhanced capabilities 2025-03-26 at 17:02 By Help Net Security ESET investigated suspicious activity on the network of a trade group in the United States that operates in the financial sector. While helping the affected entity remediate the compromise, they made an unexpected discovery in the victim’s system: malicious tools

React to this headline:

Loading spinner

China-linked FamousSparrow APT group resurfaces with enhanced capabilities Read More »

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US 2025-03-24 at 14:31 By Eduard Kovacs The FCC is investigating whether Chinese firms such as Huawei, ZTE and China Telecom are still operating in the US. The post FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US appeared first on SecurityWeek. This

React to this headline:

Loading spinner

FCC Probes Whether Banned Chinese Telecom Providers Still Operating in US Read More »

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley 2025-03-21 at 14:16 By Ionut Arghire The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign. The post Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley Read More »

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers 2025-03-12 at 18:45 By Ryan Naraine China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers. The post Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers Read More »

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days 2025-03-12 at 15:03 By Eduard Kovacs Dragos case study reveals that Volt Typhoon hacked the US electric grid and stole information on OT systems. The post China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days appeared first on SecurityWeek. This

React to this headline:

Loading spinner

China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days Read More »

US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives 

US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives  2025-03-05 at 21:31 By Ryan Naraine i-Soon employees charged with conducting extensive hacking campaigns on behalf of Beijing’s security services. The post US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this headline:

React to this headline:

Loading spinner

US Indicts China’s iSoon ‘Hackers-for-Hire’ Operatives  Read More »

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts 2025-02-25 at 19:11 By Eduard Kovacs A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks. The post Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts Read More »

China-based Silver Fox spoofs healthcare app to deliver malware

China-based Silver Fox spoofs healthcare app to deliver malware 2025-02-25 at 18:33 By Zeljka Zorz Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering the ValleyRAT backdoor to unsuspecting users by disguising the malware as legitimate healthcare app (the Philips DICOM viewer), a Windows

React to this headline:

Loading spinner

China-based Silver Fox spoofs healthcare app to deliver malware Read More »

Scroll to Top