Chinese hackers use custom malware to spy on US telecom networks
The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially…
The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially…
The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.
The $2.65B buy validates the growing importance of threat intelligence to enterprise security strategies.
The malware is a customized variant of the powerful open source XenoRAT information stealing malware often deployed by Kimsuky and…
CISA recommends disabling the legacy Cisco Smart Install feature after seeing it abused by threat actors in recent attacks to…
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and…
Government ministries keep falling victim to relatively standard-fare cyber-espionage attacks, like this latest campaign with hazy Chinese links.
Against a backdrop of political conflict, a years-long cyber espionage campaign in South Asia is coming to light.
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
Researchers believe the attacker is likely China-affiliated, since a previous version of the malware was used by a China nation-state…