Nation-State

France Blames Russia for Cyberattacks on Dozen Entities

France Blames Russia for Cyberattacks on Dozen Entities 2025-04-30 at 13:20 By Ionut Arghire France says the Russian state-sponsored group APT28 is responsible for targeting or compromising a dozen French entities. The post France Blames Russia for Cyberattacks on Dozen Entities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source […]

React to this headline:

Loading spinner

France Blames Russia for Cyberattacks on Dozen Entities Read More »

South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days

South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days 2025-04-25 at 14:31 By Ionut Arghire Multiple South Korean organizations across industries have been targeted in a recent Lazarus campaign dubbed Operation SyncHole. The post South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

South Korean Companies Targeted by Lazarus via Watering Hole Attacks, Zero-Days Read More »

Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack 

Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack  2025-04-21 at 22:47 By Ryan Naraine Microsoft security chief Charlie Bell says the SFI’s 28 objectives are “near completion” and that 11 others have made “significant progress.” The post Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack  appeared first

React to this headline:

Loading spinner

Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack  Read More »

Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare

Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare 2025-04-21 at 14:25 By Associated Press Countries around the world are preparing for greater digital conflict as increasing global tensions and a looming trade war have raised the stakes. The post Countries Shore Up Their Digital Defenses as Global Tensions Raise

React to this headline:

Loading spinner

Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare Read More »

Chinese APT Mustang Panda Updates, Expands Arsenal

Chinese APT Mustang Panda Updates, Expands Arsenal 2025-04-17 at 14:05 By Ionut Arghire The Chinese state-sponsored group Mustang Panda has used new and updated malicious tools in a recent attack. The post Chinese APT Mustang Panda Updates, Expands Arsenal appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

Chinese APT Mustang Panda Updates, Expands Arsenal Read More »

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games 2025-04-15 at 14:01 By Associated Press China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin. The post China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games Read More »

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

China Admitted to US That It Conducted Volt Typhoon Attacks: Report 2025-04-11 at 13:14 By Eduard Kovacs In a secret meeting between Chinese and US officials, the former confirmed conducting cyberattacks on US infrastructure. The post China Admitted to US That It Conducted Volt Typhoon Attacks: Report appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Read More »

North Korea’s IT Operatives Are Exploiting Remote Work Globally

North Korea’s IT Operatives Are Exploiting Remote Work Globally 2025-04-02 at 16:32 By Kevin Townsend The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations. The post North Korea’s IT Operatives Are Exploiting Remote Work Globally appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

North Korea’s IT Operatives Are Exploiting Remote Work Globally Read More »

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks 2025-04-02 at 13:50 By Ionut Arghire North Korea’s Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem. The post Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks Read More »

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley 2025-03-21 at 14:16 By Ionut Arghire The FishMonger APT group, a subdivision of Chinese cybersecurity firm I-Soon, compromised seven organizations in a 2022 campaign. The post Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley Read More »

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers 2025-03-12 at 18:45 By Ryan Naraine China-nexus cyberespionage group caught planting custom backdoors on end-of-life Juniper Networks Junos OS routers. The post Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to this

React to this headline:

Loading spinner

Mandiant Uncovers Custom Backdoors on End-of-Life Juniper Routers Read More »

1,600 Victims Hit by South American APT’s Malware

1,600 Victims Hit by South American APT’s Malware 2025-03-11 at 14:08 By Ionut Arghire South American cyberespionage group Blind Eagle has infected over 1,600 organizations in Colombia in a recent campaign. The post 1,600 Victims Hit by South American APT’s Malware appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

1,600 Victims Hit by South American APT’s Malware Read More »

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist 2025-03-07 at 01:09 By Ryan Naraine The $1.4 billion ByBit cryptocurrency heist combined social engineering, stolen AWS session tokens, MFA bypasses and a rigged JavaScript file. The post How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist Read More »

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain 2025-03-05 at 18:02 By Ryan Naraine Silk Typhoon APT caught using IT supply chain entry points to conduct reconnaissance, siphon data, and move laterally on victim networks. The post China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain appeared first on SecurityWeek.

React to this headline:

Loading spinner

China Hackers Behind US Treasury Breach Caught Targeting IT Supply Chain Read More »

Iranian Hackers Target UAE Firms With Polyglot Files

Iranian Hackers Target UAE Firms With Polyglot Files 2025-03-05 at 16:08 By Ionut Arghire An Iranian threat actor was seen targeting UAE organizations with polyglot files to deliver a new backdoor named Sosano. The post Iranian Hackers Target UAE Firms With Polyglot Files appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View

React to this headline:

Loading spinner

Iranian Hackers Target UAE Firms With Polyglot Files Read More »

North Korean Fake IT Workers Pose as Blockchain Developers on GitHub

North Korean Fake IT Workers Pose as Blockchain Developers on GitHub 2025-03-05 at 15:03 By Ionut Arghire North Korean fake IT workers are creating personas on GitHub to land blockchain developer jobs at US and Japanese firms. The post North Korean Fake IT Workers Pose as Blockchain Developers on GitHub appeared first on SecurityWeek. This

React to this headline:

Loading spinner

North Korean Fake IT Workers Pose as Blockchain Developers on GitHub Read More »

Freelance Software Developers in North Korean Malware Crosshairs

Freelance Software Developers in North Korean Malware Crosshairs 2025-02-21 at 18:01 By Ionut Arghire ESET says hundreds of freelance software developers have fallen victim to North Korean hackers posing as recruiters. The post Freelance Software Developers in North Korean Malware Crosshairs appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Freelance Software Developers in North Korean Malware Crosshairs Read More »

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics 2025-02-21 at 17:04 By Ryan Naraine Cisco Talos observed Chinese hackers team pivoting from a compromised device operated by one telecom to target a device in another telecom. The post Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Cisco Details ‘Salt Typhoon’ Network Hopping, Credential Theft Tactics Read More »

How China Pinned University Cyberattacks on NSA Hackers

How China Pinned University Cyberattacks on NSA Hackers 2025-02-21 at 14:34 By Ionut Arghire A researcher dives into Chinese reports attributing cyberattacks on Northwestern Polytechnical University to the NSA’s TAO division. The post How China Pinned University Cyberattacks on NSA Hackers appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

How China Pinned University Cyberattacks on NSA Hackers Read More »

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines 2025-02-20 at 19:29 By Ryan Naraine China-linked cyberespionage toolkits are popping up in ransomware attacks, forcing defenders to rethink how they combat state-backed hackers. The post Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines Read More »

Scroll to Top