Tag: military
-
New Zealand sanctions Russian military hackers over cyberattacks on Ukraine
New Zealand has imposed sanctions on Russian military intelligence hackers accused of cyberattacks on Ukraine, including members of a notorious hacking unit previously tied to destructive malware campaigns. First seen on therecord.media Jump to article: therecord.media/new-zealand-russia-gru-ukraine
-
Nork snoops whip up fake South Korean military ID with help from ChatGPT
Kimsuky gang proves that with the right wording, you can turn generative AI into a counterfeit factory First seen on theregister.com Jump to article: www.theregister.com/2025/09/15/north_korea_chatgpt_fake_id/
-
AI-Forged Military IDs Used in North Korean Phishing Attack
Genians observed the Kimsuky group impersonate a defense institution in a spear-phishing attack, leveraging ChatGPT to create fake military ID cards First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ai-military-ids-north-korea/
-
Pro-Russian Hackers Target Critical Industries Across the Globe
In 2024, as the Russia-Ukraine war prolongs and military and economic cooperation between North Korea and Russia deepens, cyberspace has emerged as a central battleground for international conflict. Russia is increasingly using cyber-attacks as a strategic tool to alleviate economic pressure from international sanctions and to bolster its war capabilities. This shift has led to…
-
Hackers using generative AI “ChatGPT” to evade anti-virus defenses
The Kimsuky APT group has begun leveraging generative AI ChatGPT to craft deepfake South Korean military agency ID cards. Phishing lures deliver batch files and AutoIt scripts designed to evade anti-virus scanning through sophisticated obfuscation. Organizations must deploy endpoint detection and response (EDR) solutions to unmask hidden scripts and secure endpoints. On July 17, 2025,…
-
Cyber Privateers: The Return of the Hack-Back Debate
Is the second Trump administration open to private-sector companies, or non-military or other government agencies, using offensive security against cyber threats? First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/cyber-privateers-the-return-of-the-hack-back-debate/
-
Philippine military company spied upon with new China-linked malware
Cybersecurity researchers examining an intrusion into the network of a Philippine military company found a “new and advanced malware toolset” that they linked to China. First seen on therecord.media Jump to article: therecord.media/philippines-military-company-suspected-china-espionage-eggstreme-malware
-
Sidewinder Hackers Exploit LNK Files to Deploy Malicious Scripts
In a striking evolution of its tactics, the Sidewinder advanced persistent threat (APT) group”, also known as APT-C-24 or “Rattlesnake””, has adopted a novel delivery mechanism leveraging Windows shortcut (LNK) files to orchestrate complex, multi-stage intrusions across South Asia. Active since at least 2012 and targeting governments, energy utilities, military installations, and mining operations in…
-
EggStreme: New Fileless Malware from a Chinese APT Targets Philippine Military
The post EggStreme: New Fileless Malware from a Chinese APT Targets Philippine Military appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/eggstreme-new-fileless-malware-from-a-chinese-apt-targets-philippine-military/
-
Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset
Bitdefender said the sophisticated multi-stage operation allowed attackers to maintain persistent access and steal sensitive data from a Philippines military company First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-apt-military-fileless/
-
EggStreme Malware Emerges With Fileless Techniques and DLL Sideloading Payloads
A Chinese APT group compromised a Philippine military company using a new, fileless malware framework called EggStreme. This multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads. The core component, EggStremeAgent, is a full-featured backdoor that enables extensive system reconnaissance, lateral movement, and data…
-
BAE Systems surfaces autonomous submarine for military use
Tags: militaryBattery powered now, fuel-cells tomorrow – all packed in a shipping box First seen on theregister.com Jump to article: www.theregister.com/2025/09/11/bae_systems_surfaces_autonomous_submarine/
-
Beijing went to ‘EggStreme’ lengths to attack Philippines military, researchers say
Ovoid-themed in-memory malware offers a menu for mayhem First seen on theregister.com Jump to article: www.theregister.com/2025/09/11/eggstreme_malware_china_philippines/
-
Chinese APT Hits Philippine Military Firm with New EggStreme Fileless Malware
Bitdefender uncovers EggStreme, a fileless malware by a China-based APT targeting the Philippine military and APAC organisations. Cybersecurity… First seen on hackread.com Jump to article: hackread.com/chinese-apt-philippine-military-eggstreme-fileless-malware/
-
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a previously undocumented fileless malware framework called EggStreme.”This multi-stage toolset achieves persistent, low-profile espionage by injecting malicious code directly into memory and leveraging DLL sideloading to execute payloads,” Bitdefender First seen on thehackernews.com Jump to…
-
Keys veröffentlicht: Angreifer konnten Livestreams des US-Militärs kapern
Jeder hätte über offizielle Social-Media-Kanäle des US-Militärs eigene Inhalte streamen können. Die nötigen Keys sind wohl über Google auffindbar gewesen. First seen on golem.de Jump to article: www.golem.de/news/keys-veroeffentlicht-angreifer-konnten-livestreams-des-us-militaers-kapern-2509-199945.html
-
Attackers test the limits of railway cybersecurity
Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/09/railway-systems-cybersecurity/
-
Attackers test the limits of railway cybersecurity
Railway systems are the lifeblood of many economies, supporting everything from daily passenger transport to military and industrial operations, so the question arises: how … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/09/railway-systems-cybersecurity/
-
‘I broke completely’: how jobseekers from Africa are being tricked into slavery in Asia’s cyberscam compounds
A growing number of Kenyans, Ugandans and Ethiopians are being trafficked to Myanmar, where missing online scam targets leads to beatings and torture”¢ <a href=”https://www.theguardian.com/global-development/2025/sep/08/myanmar-military-junta-scam-centres-trafficking-crime-syndicates-kk-park”>Revealed: the huge growth of Myanmar scam centres that may hold 100,000 trafficked peopleWithin hours of landing in Bangkok from Nairobi last December to start a job as a customer service…
-
ISMG Editors: The Pentagon, Microsoft and Chinese Workers
Also: Software Supply Chain Risks, Cato’s AI Security Buy. In this week’s update, four ISMG editors discussed the Pentagon’s review of Microsoft’s use of Chinese nationals on U.S. military cloud systems, renewed concerns over software supply chain risks and Cato Networks’ first-ever acquisition to boost AI security. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-pentagon-microsoft-chinese-workers-a-29380
-
Digital Legacy AI CEO Glenn Devitt Bridges Military Intelligence and Cybersecurity
Former Army Special Operations Intelligence specialist combines battlefield experience with cutting-edge cybersecurity expertise to revolutionize digital inheritance while addressing critical infrastructure vulnerabilities. The cybersecurity landscape demands leaders who understand both technical complexity and operational reality under pressure. Glenn Devitt represents a rare convergence of these capabilities”, a former U.S. Army Special Operations Intelligence veteran whose…
-
Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure
Tags: access, advisory, apt, attack, authentication, breach, china, cisa, cisco, cloud, compliance, computer, computing, control, credentials, cryptography, cve, cyber, cybersecurity, data, defense, detection, espionage, exploit, firmware, framework, google, government, guide, hacker, Hardware, incident response, infrastructure, international, Internet, iot, login, mfa, military, mitigation, monitoring, network, nist, organized, password, phishing, ransomware, regulation, risk, russia, sans, service, software, technology, theft, threat, tool, update, vulnerability, zero-trustDestructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical infrastructure networks. With this type of cyber threat in the spotlight, we’re rounding up recent cyber advice for securing critical infrastructure. In case you missed it, here…
-
Shift5 Gets $75M for Cyber Push in Defense and Transit
Startup to Expand Dual-Use Tech, Tackle GPS Jamming Threats With Series C Funding. With a $75 million Series C raise, Shift5 plans to scale its operational intelligence platform across military and commercial transportation. Its focus includes enhanced threat detection, predictive maintenance and data-driven safety measures amid rising cyberthreats to infrastructure. First seen on govinfosecurity.com Jump…
-
Chinese APT Groups Exploit Router Flaws to Breach Enterprises
Chinese state-sponsored Advanced Persistent Threat (APT) groups have escalated their cyber espionage campaigns, systematically targeting global telecommunications, government, and military networks through sophisticated router exploitation techniques since 2021. Since at least 2021, Chinese state-sponsored cyber actors have been conducting extensive, stealthy operations to infiltrate and control key network devices across critical sectors worldwide. These malicious…
-
How Military Discipline Shapes Cybersecurity Leadership
Erica Dobbs reminds us that cybersecurity isn’t just zeros and ones; it is people, procedure, and poise under pressure. Lead through chaos, deliver with precision, and treat every day like it touches the mission, because it often does. First seen on crn.com Jump to article: www.crn.com/news/security/2025/how-military-discipline-shapes-cybersecurity-leadership
-
China Is About to Show Off Its New High-Tech Weapons to the World
On September 3, China will hold a “Victory Day” military parade in Tiananmen Square to celebrate the 80th anniversary of its victory over Japan”, and to send the West a message. First seen on wired.com Jump to article: www.wired.com/story/china-victory-day-parade-weapons/
-
Chinese hacking group Salt Typhoon expansion prompts multinational advisory
Tags: advisory, attack, authentication, breach, china, cisco, communications, container, corporate, country, cyber, data, exploit, firmware, flaw, government, group, hacking, infrastructure, intelligence, Internet, ivanti, malware, military, monitoring, network, password, router, service, software, technology, threat, update, vulnerability, zero-dayIvanti, Palo Alto Networks, Cisco flaws exploited: Salt Typhoon has been active since at least 2021, targeting critical infrastructure in telecom, transportation, government, and military bodies around the globe. Notably, a “cluster of activity” has been observed in the UK, according to the country’s National Cyber Security Centre.The group has had “considerable success” with “n-days,”…
-
Pentagon Probes Microsoft’s Use of Chinese Coders
Defense Department Suspends, Reviews Microsoft ‘Digital Escorts’ Program. The Pentagon is reviewing Microsoft’s decade-long use of digital escorts – U.S.-based staff who review code from Chinese engineers – into military cloud systems, a workaround now deemed a breach of trust that may have exposed sensitive but unclassified government data. First seen on govinfosecurity.com Jump to…

