China

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts 2025-02-25 at 19:11 By Eduard Kovacs A China-linked botnet powered by 130,000 hacked devices has targeted Microsoft 365 accounts with password spraying attacks. The post Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts appeared first on SecurityWeek. This article is an excerpt from […]

React to this headline:

Loading spinner

Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts Read More »

China-based Silver Fox spoofs healthcare app to deliver malware

China-based Silver Fox spoofs healthcare app to deliver malware 2025-02-25 at 18:33 By Zeljka Zorz Silver Fox, a China-based threat actor that may or may not be backed by the Chinese government, has been delivering the ValleyRAT backdoor to unsuspecting users by disguising the malware as legitimate healthcare app (the Philips DICOM viewer), a Windows

React to this headline:

Loading spinner

China-based Silver Fox spoofs healthcare app to deliver malware Read More »

OpenAI Bans ChatGPT Accounts Used by Chinese Group for Spy Tools

OpenAI Bans ChatGPT Accounts Used by Chinese Group for Spy Tools 2025-02-24 at 19:18 By Eduard Kovacs OpenAI has banned ChatGPT accounts used by Chinese threat actors, including ones leveraged for the development of spying tools. The post OpenAI Bans ChatGPT Accounts Used by Chinese Group for Spy Tools appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

OpenAI Bans ChatGPT Accounts Used by Chinese Group for Spy Tools Read More »

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics 2025-02-21 at 17:04 By Ryan Naraine Cisco Talos observed Chinese hackers team pivoting from a compromised device operated by one telecom to target a device in another telecom. The post Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics Read More »

How China Pinned University Cyberattacks on NSA Hackers

How China Pinned University Cyberattacks on NSA Hackers 2025-02-21 at 14:34 By Ionut Arghire A researcher dives into Chinese reports attributing cyberattacks on Northwestern Polytechnical University to the NSA’s TAO division. The post How China Pinned University Cyberattacks on NSA Hackers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

How China Pinned University Cyberattacks on NSA Hackers Read More »

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks 2025-02-14 at 14:05 By Ionut Arghire China-linked APT Salt Typhoon has been exploiting known vulnerabilities in Cisco devices in attacks on telecom providers in the US and abroad. The post Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks Read More »

New Windows Zero-Day Exploited by Chinese APT: Security Firm

New Windows Zero-Day Exploited by Chinese APT: Security Firm 2025-02-14 at 13:52 By Eduard Kovacs ClearSky Cyber Security says it has seen a new Windows zero-day being exploited by a Chinese APT named Mustang Panda.  The post New Windows Zero-Day Exploited by Chinese APT: Security Firm appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

New Windows Zero-Day Exploited by Chinese APT: Security Firm Read More »

Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job

Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job 2025-02-13 at 15:34 By Ionut Arghire A toolset associated with China-linked espionage intrusions was employed in a ransomware attack, likely by a single individual. The post Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job Read More »

Can AI Early Warning Systems Reboot the Threat Intel Industry?

Can AI Early Warning Systems Reboot the Threat Intel Industry? 2025-02-10 at 13:02 By Ryan Naraine News analysis: The big AI platforms are emerging as frontline early warning systems, detecting nation-state hackers at the outset of their campaigns. Can this help save the threat intel industry? The post Can AI Early Warning Systems Reboot the

React to this headline:

Loading spinner

Can AI Early Warning Systems Reboot the Threat Intel Industry? Read More »

House Lawmakers Push to Ban AI App DeepSeek From US Government Devices

House Lawmakers Push to Ban AI App DeepSeek From US Government Devices 2025-02-06 at 22:16 By Associated Press A bipartisan duo in the the U.S. House is proposing legislation to ban the Chinese artificial intelligence app DeepSeek from federal devices. The post House Lawmakers Push to Ban AI App DeepSeek From US Government Devices appeared

React to this headline:

Loading spinner

House Lawmakers Push to Ban AI App DeepSeek From US Government Devices Read More »

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US 2025-02-05 at 23:47 By Associated Press DeepSeek has computer code that could send some user login information to China Mobile. The post Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Researchers Link DeepSeek’s Blockbuster Chatbot to Chinese Telecom Banned From Doing Business in US Read More »

DeepSeek’s popularity exploited by malware peddlers, scammers

DeepSeek’s popularity exploited by malware peddlers, scammers 2025-01-29 at 15:18 By Zeljka Zorz As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of the cost, users are rushing to try out DeepSeek’s AI tool. In the process, they

React to this headline:

Loading spinner

DeepSeek’s popularity exploited by malware peddlers, scammers Read More »

China-aligned PlushDaemon APT compromises supply chain of Korean VPN

China-aligned PlushDaemon APT compromises supply chain of Korean VPN 2025-01-22 at 08:04 By Help Net Security ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this cyberespionage campaign, the attackers compromised the legitimate installer, replacing it with a malicious

React to this headline:

Loading spinner

China-aligned PlushDaemon APT compromises supply chain of Korean VPN Read More »

US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks

US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks 2024-12-10 at 22:48 By Help Net Security The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims

React to this headline:

Loading spinner

US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks Read More »

8+ US telcos compromised, FBI advises Americans to use encrypted communications

8+ US telcos compromised, FBI advises Americans to use encrypted communications 2024-12-05 at 14:24 By Zeljka Zorz FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors that have – and will – burrow into the networks and systems

React to this headline:

Loading spinner

8+ US telcos compromised, FBI advises Americans to use encrypted communications Read More »

Active network of North Korean IT front companies exposed

Active network of North Korean IT front companies exposed 2024-11-21 at 16:18 By Zeljka Zorz An analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active network of such companies originating in China. Unearthing North Korean IT front

React to this headline:

Loading spinner

Active network of North Korean IT front companies exposed Read More »

FBI confirms China-linked cyber espionage involving breached telecom providers

FBI confirms China-linked cyber espionage involving breached telecom providers 2024-11-14 at 14:16 By Zeljka Zorz After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the attacks, which were part

React to this headline:

Loading spinner

FBI confirms China-linked cyber espionage involving breached telecom providers Read More »

Biden-Harris Policies Ignited Global Chaos: WW3 Fears Rise as 2024 Election Nears

Biden-Harris Policies Ignited Global Chaos: WW3 Fears Rise as 2024 Election Nears 2024-10-21 at 12:30 By As the 2024 election approaches, the Biden-Harris administration’s foreign policy has left the world in utter chaos and teetering on the brink of World War III — from the disastrous Afghanistan withdrawal to the Israel-Hamas war — all while

React to this headline:

Loading spinner

Biden-Harris Policies Ignited Global Chaos: WW3 Fears Rise as 2024 Election Nears Read More »

Mandiant Offers Clues to Spotting and Stopping North Korean Fake IT Workers

Mandiant Offers Clues to Spotting and Stopping North Korean Fake IT Workers 2024-09-23 at 20:31 By Ryan Naraine Mandiant shines the spotlight on the growing infiltration of US and Western companies by North Korean fake IT workers. The post Mandiant Offers Clues to Spotting and Stopping North Korean Fake IT Workers appeared first on SecurityWeek.

React to this headline:

Loading spinner

Mandiant Offers Clues to Spotting and Stopping North Korean Fake IT Workers Read More »

Ban Sought for Chinese, Russian Software and Hardware Used in Autonomous Vehicles on US Roads

Ban Sought for Chinese, Russian Software and Hardware Used in Autonomous Vehicles on US Roads 2024-09-23 at 17:02 By Associated Press In extreme situations, a foreign adversary could shut down or take simultaneous control of multiple vehicles operating in the United States, causing crashes and blocking roads. The post Ban Sought for Chinese, Russian Software

React to this headline:

Loading spinner

Ban Sought for Chinese, Russian Software and Hardware Used in Autonomous Vehicles on US Roads Read More »

Scroll to Top