Tag: espionage
-
UK ‘Extremely Worried’ About Cyberthreats
Risk of Espionage and Disruption Key Risks, Lawmakers Warned. The British government is extremely worried about the Chinese and Russian cyberespionage and disruptive hacks, government officials told the U.K. Public Accounts Committee on Monday. The United Kingdom has faced a substantial escalation in cyberthreats in the last three years, lawmakers heard. First seen on govinfosecurity.com…
-
UK ‘Extremely Worried’ About Cyber Threats
Risk of Espionage and Disruption Key Risks, Lawmakers Warned. The British government is extremely worried about the Chinese and Russian cyber espionage and disruptive hacks, government officials told the UK Public Accounts Committee on Monday. The United Kingdom has faced a substantial escalation in cyberthreats in the last three years, lawmakers heard. First seen on…
-
Blind Eagle: “¦And Justice for All
ey Points Introduction APT-C-36, also known as Blind Eagle, is a threat group that engages in both espionage and cybercrime. It primarily targets organizations in Colombia and other Latin American countries. Active since 2018, this Advanced Persistent Threat (APT) group focuses on government institutions, financial organizations, and critical infrastructure. Blind Eagle is known for employing…
-
âš¡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact
Cyber threats today don’t just evolve”, they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds”, ranging from nation-state espionage and ransomware to manipulated AI chatbots”, the landscape becomes increasingly complex, prompting vital questions: How secure are our cloud environments? Can our First seen on…
-
UK Cybersecurity Weekly News Roundup 9 March 2025
Tags: android, attack, backdoor, breach, china, cloud, compliance, computer, cyber, cyberattack, cybercrime, cybersecurity, data, espionage, exploit, government, group, hacker, infrastructure, international, malware, microsoft, network, ransomware, regulation, resilience, service, skills, software, theft, update, vulnerabilityWelcome to this week’s edition of our cybersecurity news roundup, bringing you the latest developments and insights from the UK and beyond. Microsoft Engineer’s Transition to Cybersecurity Ankit Masrani, a 36-year-old software engineer, successfully transitioned into a cybersecurity role at Microsoft. With a background in IT and a Master’s degree in computer science, Masrani secured…
-
Canadian intelligence agency warns of threat AI poses to upcoming elections
Influence and espionage campaigns, boosted by AI, are likely to be aimed at Canada’s upcoming elections, says a new report from the CSE, the country’s signals and cyber intelligence agency. First seen on therecord.media Jump to article: therecord.media/canada-cyber-agency-elections-warning-ai-
-
Zero-Day Attacks Stolen Keys: Silk Typhoon Breaches Networks
Microsoft Threat Intelligence has uncovered a strategic shift in the tactics of Silk Typhoon, a Chinese state-backed cyber-espionage First seen on securityonline.info Jump to article: securityonline.info/zero-day-attacks-stolen-keys-silk-typhoon-breaches-networks/
-
UNK_CraftyCamel: New Threat Group Using Polyglot Malware in UAE
Cybersecurity researchers at Proofpoint have identified a highly targeted cyber-espionage campaign employing polyglot malware to compromise aviation, satellite First seen on securityonline.info Jump to article: securityonline.info/unk_craftycamel-new-threat-group-using-polyglot-malware-in-uae/
-
Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain
Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common IT solutions such as remote management tools and cloud applications for initial access. This well-resourced and technically proficient threat actor has demonstrated a large targeting footprint among Chinese threat actors, exploiting vulnerabilities in edge devices…
-
Chinese Silk Typhoon Group Targets IT Tools for Network Breaches
Microsoft warns that Chinese espionage group Silk Typhoon now exploits IT tools like remote management apps and cloud services to breach networks. First seen on hackread.com Jump to article: hackread.com/chinese-silk-typhoon-group-it-tools-network-breaches/
-
Silk Typhoon hackers now target IT supply chains to breach networks
Microsoft warns that Chinese cyber-espionage threat group ‘Silk Typhoon’ has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/silk-typhoon-hackers-now-target-it-supply-chains-to-breach-networks/
-
Silk Typhoon Shifts Tactics to Exploit Common IT Solutions
Chinese espionage group Silk Typhoon is increasingly exploiting common IT solutions to infiltrate networks and exfiltrate data First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/silk-typhoon-exploits-common/
-
Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America
The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America in 2024.The findings come from Russian cybersecurity company Positive Technologies, which described the malware as loaded with a “full suite of espionage features.””It could upload…
-
Operation Sea Elephant Cyber-Espionage Campaign Targeting South Asia
A recent report from Qi’anxin Threat Intelligence Center exposes an advanced cyber-espionage campaign dubbed Operation Sea Elephant, which First seen on securityonline.info Jump to article: securityonline.info/operation-sea-elephant-cyber-espionage-campaign-targeting-south-asia/
-
Enhancing security with Microsoft’s expanded cloud logs
Nation-state-sponsored hacking stories are a big part of everyone’s favourite Hollywood movies”‰”, “‰that is, until it becomes a real-life story of our own compromised personal or corporate sensitive data ending up on the dark web or in hackers’ hands. In real life, cyber espionage groups’ activities trigger stringent security enforcement. First in the government sector,…
-
New Cyber-Espionage Campaign Targets UAE Aviation and Transport
A cyber-espionage campaign targeting UAE aviation and transport has been identified by researchers, using customized lures to deploy Sosano malware First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/espionage-campaign-targets-uae/
-
Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector
Tags: attack, business, communications, cyber, espionage, exploit, hacker, infrastructure, malware, threatA sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the United Arab Emirates has been uncovered by Proofpoint researchers. The operation, attributed to a threat cluster dubbed >>UNK_CraftyCamel,
-
Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics
Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent threat (APT) group, in their HTA (HTML Application) Trojan. The analysis, part of an ongoing investigation into APT28’s cyber espionage campaigns targeting Central Asia and Kazakhstan, highlights the group’s use of multi-layered obfuscation and the VBE (VBScript Encoded) technique to evade…
-
Dark Caracal group might have refreshed its malware, researchers say
Dark Caracal, a group suspected of cyber mercenary activities, appeared to shift to a new espionage tool in a campaign aimed at Latin American targets, according to researchers. First seen on therecord.media Jump to article: therecord.media/dark-caracal-hackers-poco-rat-bandook
-
Hunters International Claims Tata Technologies Cyberattack
Tags: breach, cyber, cyberattack, data, espionage, group, international, ransomware, service, technology, theftMultinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a significant cyberattack claimed by the ransomware group Hunters International. According to recent social media reports, the breach allegedly resulted in the theft of 1.4 terabytes of sensitive data, raising concerns about potential industrial espionage and operational disruptions for high-profile clients such…
-
Lotus Blossom Hackers Target Southeast Asia with Sagerunex Backdoor
A sophisticated cyber espionage operation linked to the Lotus Blossom group has been discovered targeting government, manufacturing, telecommunications, First seen on securityonline.info Jump to article: securityonline.info/lotus-blossom-hackers-target-southeast-asia-with-sagerunex-backdoor/
-
China hacking has reached ‘inflection point’
In its 2025 Global Threat Report, CrowdStrike observed an increase in China’s cyber capabilities, with a focus on espionage and ‘pre-positioning’ itself in critical environments. First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366619774/CrowdStrike-China-hacking-has-reached-inflection-point
-
Cyber Espionage in Thailand: Chinese APT Deploys Yokai Malware
Cado Security Labs has uncovered a new malware campaign targeting the Royal Thai Police, attributed to the Chinese First seen on securityonline.info Jump to article: securityonline.info/cyber-espionage-in-thailand-chinese-apt-deploys-yokai-malware/
-
Australia bans government use of Kaspersky software over Russian espionage concerns
Kaspersky software “poses an unacceptable security risk to the Australian government, networks, and data,” Home Affairs Secretary Stephanie Foster said in announcing a ban on the cybersecurity company’s products. First seen on therecord.media Jump to article: therecord.media/kaspersky-australia-government-ban
-
Australia bans Kaspersky over national security concerns
Australia bans Kaspersky software over national security concerns, citing risks of foreign interference, espionage, and sabotage of government networks. Australian Government banned products and services provided by Russian cybersecurity firm Kaspersky over national security concerns. The Secretary of the Department of Home Affairs has issued a mandatory directive under the Protective Security Policy Framework (PSPF)…
-
Australia Bans Kaspersky Software Over National Security and Espionage Concerns
Australia has become the latest country to ban the installation of security software from Russian company Kaspersky, citing national security concerns.”After considering threat and risk analysis, I have determined that the use of Kaspersky Lab, Inc. products and web services by Australian Government entities poses an unacceptable security risk to Australian Government, networks and data,…

