Tag: china
-
Hackers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines
Threat actors linked to China have deployed a novel backdoor, according to researchers. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/zero-day-dell-recoverpoint-virtual-machines-exploited/812392/
-
Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed
Google researchers said Chinese attackers have been exploiting a zero-day since mid-2024, and they’ve moved on to a more advanced version of Brickstorm malware called Grimbolt. First seen on cyberscoop.com Jump to article: cyberscoop.com/china-brickstorm-grimbolt-dell-zero-day/
-
China-linked snoops have been exploiting Dell 0-day since mid-2024, using ‘ghost NICs’ to avoid detection
Full scale of infections remains ‘unknown’ First seen on theregister.com Jump to article: www.theregister.com/2026/02/18/dell_0day_brickstorm_campaign/
-
Hsckers exploit zero-day flaw in Dell RecoverPoint for Virtual Machines
Threat actors linked to China have deployed a novel backdoor, according to researchers. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/zero-day-dell-recoverpoint-virtual-machines-exploited/812392/
-
China remains embedded in US energy networks ‘for the purpose of taking it down’
Plus 3 new goon squads targeted critical infrastructure last year First seen on theregister.com Jump to article: www.theregister.com/2026/02/17/volt_typhoon_dragos/
-
Chinese hackers exploiting Dell zero-day flaw since mid-2024
A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/
-
MCSC 2026: ‘Politik und Wirtschaft müssen zusammenarbeiten”
Tags: bsi, china, conference, control, cyber, cybercrime, cybersecurity, cyersecurity, north-korea, office, usaDas Motto der Munich Cybersecurity Conference 2026: “Command Control, Really? Confronting The Illusion Of Deterrence In The Age Of Relentless Cyber Threats.” Julia MutzbauerAuch in diesem Jahr waren wieder zahlreiche internationale Institutionen auf der Münchner Cybersicherheitskonferenz (MCSC) vertreten. Darunter das Weiße Haus, FBI, Europol, OECD, BSI, BND und die Europäische Kommission sowie das National Cybersecurity…
-
US lawyers fire up privacy class action accusing Lenovo of bulk data transfers to China
Keep behavioral tracking American? PC giant says the claim is ‘false’ First seen on theregister.com Jump to article: www.theregister.com/2026/02/17/lenovo_privacy_lawsuit/
-
Why Borderless AI Is Coming to an End
Countries Are Pouring Billions Into Domestic AI Stacks to Escape US-China Dominance. By 2027, more than one-third of the world’s nations will be locked into region-specific AI platforms built on proprietary data, infrastructure and governance frameworks, according to Gartner. Nations are now safeguarding LLMs in the same way they do critical infrastructure. First seen on…
-
China verlangt Erstmeldung bei Cybervorfällen in wenigen Stunden – Chinas neue Cyberregeln setzen deutsche Firmen unter Druck
Tags: chinaFirst seen on security-insider.de Jump to article: www.security-insider.de/china-cybersicherheitsgesetz-meldepflicht-deutsche-firmen-a-041dffb729c0499cd8a0e3b00c0110fd/
-
Chinese Bots Targeting Websites of Government Portals, Paranormal Activity Blogs
Since last year, website administrators across Western countries have been dealing with a strange and sustained spike in traffic traced to China and Singapore. What initially appeared to be a promising expansion of international audiences quickly turned into a technical puzzle involving automated traffic, widely described as Chinese bots, with no clear explanation. First seen on thecyberexpress.com…
-
Apple privacy labels often don’t match what Chinese smart home apps do
Smart home devices in many homes collect audio, video, and location data. The apps that control those devices often focus on the account owner, even when the technology also … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/16/apple-ios-apps-china-smart-home-bystander-privacy/
-
Nation-State Hackers Put Defense Industrial Base Under Siege
Espionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors’ networks. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/nation-state-hackers-defense-industrial-base-under-siege
-
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google Threat Intelligence Group (GTIG).The tech giant’s threat intelligence division said the adversarial targeting of the sector is centered around four key themes: striking defense…
-
NATO must impose costs on Russia, China over cyber and hybrid attacks, says deputy chief
Speaking at the Munich Cyber Security Conference, Radmila Shekerinska said the security environment has become “more complex” and “more contested,” with rivals operating at the same time in the physical and digital worlds. First seen on therecord.media Jump to article: therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
-
NATO must impose costs on Russia, China over cyber and hybrid attacks, says deputy chief
Speaking at the Munich Cyber Security Conference, Radmila Shekerinska said the security environment has become “more complex” and “more contested,” with rivals operating at the same time in the physical and digital worlds. First seen on therecord.media Jump to article: therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary
-
China may be rehearsing a digital siege, Taiwan warns
Tags: chinaYuh-Jye Lee, a senior adviser at Taiwan’s National Security Council, delivered a stark warning about China’s intentions to use cyberspace in new and more aggressive ways. First seen on therecord.media Jump to article: therecord.media/china-taiwan-digital-siege-munich
-
Top Security Incidents of 2025: The Emergence of the ChainedShark APT Group
In 2025, NSFOCUS Fuying Lab disclosed a new APT group targeting China’s scientific research sector, dubbed “ChainedShark” (tracking number: Actor240820). Been active since May 2024, the group’s operations are marked by high strategic coherence and technical sophistication. Its primary targets are professionals in Chinese universities and research institutions specializing in international relations, marine technology, and related…The…
-
BADIIS Malware Targets Over 1,800 Windows Servers in Massive SEO Poisoning Attack
Over 1,800 Windows IIS servers worldwide have been compromised in a large-scale search engine optimization (SEO) poisoning campaign driven by the BADIIS malware, a malicious IIS module used to hijack legitimate web traffic. The operation, tracked by Elastic Security Labs as REF4033, is attributed to a Chinese-speaking cybercrime group that monetizes these compromised servers by…
-
What CISOs need to know about the OpenClaw security nightmare
OpenClaw exposes enterprise security gaps: The first big lesson of this whole OpenClaw situation is that enterprises need to do more to get their security fundamentals in place. Because if there are any gaps, anywhere at all, they will now be found and exploited at an unprecedented pace. In the case of OpenClaw, that means…
-
China’s APT31 used Gemini to plan cyberattacks against US orgs
Meanwhile, IP-stealing ‘distillation attacks’ on the rise First seen on theregister.com Jump to article: www.theregister.com/2026/02/12/google_china_apt31_gemini/
-
Singapore says China-backed hackers targeted its four largest phone companies
The Singaporean government said the China-backed hackers gained “limited access to critical systems” run by the country’s top four telecommunication giants, but said they did not disrupt services or steal customers’ data. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/10/singapore-china-backed-hackers-targeted-largest-phone-companies-salt-typhoon/
-
Singapore telcos breached in China-linked cyber espionage campaign
Singapore’s four major telecommunications companies were hit by a coordinated cyber espionage campaign last year, the country’s Cyber Security Agency (CSA) has revealed. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/10/singapore-telecommunications-unc3886-cyber-espionage/
-
Chinese crypto scammer sentenced in absentia to 20 years after fleeing US
The Department of Justice said it will “work with our law enforcement partners around the world to ensure that Li is returned to the United States to serve his full sentence.” First seen on therecord.media Jump to article: therecord.media/chinese-crypto-scammer-sentenced-after-fleeing-us
-
Singapore spent 11 months booting China-linked snoops out of telco networks
Operation Cyber Guardian involved 100-plus staff across government and industry First seen on theregister.com Jump to article: www.theregister.com/2026/02/10/singapore_telco_espionage/
-
Singapore Takes Down Chinese Hackers Targeting Telco Networks
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/singapore-takes-down-china-hackers/
-
China-linked APT UNC3886 targets Singapore telcos
China-linked group UNC3886 targeted Singapore ‘s telecom sector in a cyber espionage campaign, Singapore’s Cyber Security Agency revealed. Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA) ran Operation CYBER GUARDIAN to protect the telecom sector. Since July 2025, investigations showed China-linked UNC3886 launched a targeted campaign against all four major…

