Tag: cyberespionage
-
From Gmail to Google Drive: How Evasive Panda Exploits Cloud Services with CloudScout
In a recent discovery, ESET researchers unveiled >>CloudScout,
-
Novel toolset leveraged by Chinese cyberespionage gang to target cloud data
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-toolset-leveraged-by-chinese-cyberespionage-gang-to-target-cloud-data
-
Healthcare Under Fire: HeptaX Campaign Steals and Manipulates Sensitive Data
Cyble Research and Intelligence Labs (CRIL) has recently uncovered a covert and sophisticated cyberespionage campaign dubbed HeptaX, which exploits Re… First seen on securityonline.info Jump to article: securityonline.info/healthcare-under-fire-heptax-campaign-steals-and-manipulates-sensitive-data/
-
Russia Targeting Ukrainian Military Recruits With Android, Windows Malware, Google Says
Google has uncovered a Russian cyberespionage and influence campaign targeting Ukrainian military recruits. The post Russia Targeting Ukrainian Milita… First seen on securityweek.com Jump to article: www.securityweek.com/google-russia-targeting-ukrainian-military-recruits-with-android-windows-malware/
-
Russia Targeting Ukrainian Military Recruits With Android, Windows Malware
Google has uncovered a Russian cyberespionage and influence campaign targeting Ukrainian military recruits. The post Google: Russia Targeting Ukrainia… First seen on securityweek.com Jump to article: www.securityweek.com/google-russia-targeting-ukrainian-military-recruits-with-android-windows-malware/
-
Nordkoreanische Cyberspionage gefährdet internationale Sicherheit
In den letzten Jahren hat Nordkorea seine Fähigkeiten in der Cyberspionage enorm ausgebaut und gezielte Hackerangriffe auf internationale Unternehmen … First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/10/10/nordkoreanische-cyberspionage-gefaehrdet-internationale-sicherheit/
-
GoldenJackal Bypasses Air-Gaps in Sophisticated Espionage Campaigns
A new report by MatÃas Porolli, a malware researcher at ESET, has revealed a series of cyberespionage campaigns executed by the elusive Advanced Pers… First seen on securityonline.info Jump to article: securityonline.info/goldenjackal-bypasses-air-gaps-in-sophisticated-espionage-campaigns/
-
ISMG Editors: Chinese Hackers Raise Stakes in Cyberespionage
Also: AI Safety Bill Vetoed, Global Ransomware Response Guide Gets Some Revisions. In the latest weekly update, ISMG editors discussed the implication… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-chinese-hackers-raise-stakes-in-cyberespionage-a-26515
-
Asylum Ambuscade: Crimeware oder Cyberspionage?
Tags: cyberespionageFirst seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2023/06/08/asylum-ambuscade-crimeware-oder-cyberspionage/
-
US telcos subjected to Chinese cyberespionage campaign
First seen on scworld.com Jump to article: www.scworld.com/brief/us-telcos-subjected-to-chinese-cyberespionage-campaign
-
US Telcos Hit by Chinese Cyberespionage Campaign
First seen on scworld.com Jump to article: www.scworld.com/brief/us-telcos-hit-by-chinese-cyberespionage-campaign
-
North Korean Stonefly Group Continues Attacks on US Targets
Symantec’s Threat Hunter Team reveals that Stonefly, a North Korean cyberespionage group, persists in targeting U.S. organizations despite recent indi… First seen on securityonline.info Jump to article: securityonline.info/north-korean-stonefly-group-continues-attacks-on-us-targets/
-
Over 100 Russian cyberespionage domains dismantled
First seen on scworld.com Jump to article: www.scworld.com/brief/over-100-russian-cyberespionage-domains-dismantled
-
US ISPs targeted by new Chinese cyberespionage gang
First seen on scworld.com Jump to article: www.scworld.com/brief/us-isps-targeted-by-new-chinese-cyberespionage-gang
-
Iranian Cyberespionage Campaign Targets Iraqi Government
Check Point Research (CPR) has uncovered a sophisticated cyberespionage campaign aimed at the Iraqi government, bearing the hallmarks of Iranian state… First seen on securityonline.info Jump to article: securityonline.info/iranian-cyberespionage-campaign-targets-iraqi-government/
-
Fake Job Lures Target Employees of Aerospace, Energy Firms
BAE Systems Among Companies in the Sights of North Korean Cyberespionage Group. A North Korean cyberespionage group is posing as job recruiters and ta… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/fake-job-lures-target-employees-aerospace-energy-firms-a-26323
-
China Using Powerful Hacking Firms to Run Its Espionage War
5 Cybersecurity Firms Provide Large Pool of Government-Funded Espionage Resources. China’s cyberespionage campaigns, viewed as an extension of the com… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/china-using-powerful-hacking-firms-to-run-its-espionage-war-a-26296
-
Chinese APT Stately Taurus Exploits Visual Studio Code in Cyberespionage Attacks
In a recent report, cybersecurity researchers at Unit 42 have uncovered a novel and concerning tactic employed by the Chinese advanced persistent thre… First seen on securityonline.info Jump to article: securityonline.info/chinese-apt-stately-taurus-exploits-visual-studio-code-in-cyberespionage-attacks/
-
TIDRONE: The Unseen Cyberespionage Threat Targeting Taiwan’s Military and Satellite Industries
A newly identified threat cluster, dubbed TIDRONE, has been actively targeting the Taiwanese military and satellite industries since the beginning of … First seen on securityonline.info Jump to article: securityonline.info/tidrone-the-unseen-cyberespionage-threat-targeting-taiwans-military-and-satellite-industries/
-
Mounting Konni cyberespionage attacks involve similar techniques
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/mounting-konni-cyberespionage-attacks-involve-similar-techniques
-
Hackers Target Taiwan UAV, Military Industries
Threat Actor Is Likely a Beijing Cyberespionage Operator. A Chinese-speaking hacking group is targeting drone manufacturers in Taiwan and other milita… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-target-taiwan-uav-military-industries-a-26237
-
Tropic Trooper Attacks Government Organizations to Steal Sensitive Data
Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group, and it has been active since 2011. This APT group pr… First seen on gbhackers.com Jump to article: gbhackers.com/tropic-trooper-attack-steal-sensitive-data/
-
Novel Voldemort Malware Spread in Suspected Global Cyberespionage Operation
First seen on scmagazine.com Jump to article: www.scmagazine.com/brief/novel-voldemort-malware-spread-in-suspected-global-cyberespionage-operation
-
South Korean hackers exploited WPS Office zero-day to deploy malware
The South Korea-aligned cyberespionage group APT-C-60 has been leveraging a zero-day code execution vulnerability in the Windows version of WPS Office… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apt-c-60-hackers-exploited-wps-office-zero-day-to-deploy-spyglace-malware/
-
APT Gruppe Muddy Water attackiert MSPs
r Einblick in die undurchsichtige Welt der Cyberspionage und anderer wachsender Bedrohungen, mit denen Anbieter von Managed Services – und ihre Kunden… First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2023/05/02/apt-gruppe-muddy-water-attackiert-msps/
-
ESET Uncovers Zero-Day Vulnerabilities in WPS Office, Exploited by APT-C-60
ESET researchers have identified two severe vulnerabilities in WPS Office for Windows, widely exploited by the APT-C-60 cyberespionage group, which is… First seen on securityonline.info Jump to article: securityonline.info/eset-uncovers-zero-day-vulnerabilities-in-wps-office-exploited-by-apt-c-60/
-
Decipher Podcast: Rebekah Brown and John Scott-Railton on COLDRIVER and Russian Cyberespionage
Rebekah Brown and John Scott-Railton of the Citizen Lab join Dennis Fisher to dive into their group’s new report on highly targeted spear phishing cam… First seen on duo.com Jump to article: duo.com/decipher/decipher-podcast-rebekah-brown-and-john-scott-railton-on-coldriver-and-russian-cyberespionage
-
StormBamboo Compromises ISP, Spreads Malware
Read more about a China-aligned cyberespionage threat actor dubbed StormBamboo, also known as Evasive Panda, which compromised an Internet Service Pro… First seen on techrepublic.com Jump to article: www.techrepublic.com/article/stormbamboo-compromises-isp-malware/
-
Maritime firms targeted by novel SideWinder cyberespionage campaign
Tags: cyberespionageFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/maritime-firms-targeted-by-novel-sidewinder-cyberespionage-campaign

