cyber espionage

Trojanized Text Editor Software Used in Targeted Uyghur Spy Campaign

A trusted tool has turned traitor. A new Citizen Lab investigation reveals that UyghurEditPP, a legitimate open-source Uyghur-language text editor,…

10 months ago

HeptaX: Uncovering Cyberespionage Operations Through Unauthorized RDP Connections

Cyble Labs reports the HeptaX campaign, a cyberattack using malicious LNK files and scripts to exploit Remote Desktop access, targeting…

1 year ago

Iran’s Fake News Sites Targeting Voters in 2024 US Presidential Election, Says Microsoft

Microsoft's latest intelligence report has revealed alarming efforts by Iranian state-linked groups to meddle in the 2024 US presidential election.…

2 years ago

Ransomware Hits French Museums Amid Olympic Cyberattacks Surge

The attackers reportedly encrypted some financial data and are threatening to release it unless they receive a ransom. An investigation…

2 years ago

Beware! Deceptive LNK Files Used in Indian Political Espionage Campaign

The infection process unfolds with a PowerShell command embedded within the .LNK file, initiating the download and execution of a…

2 years ago

New Chinese Espionage Threat Targeted Southeast Asian Government Organization

Threat actors linked to Chinese state interests have been targeting an unnamed high-profile Southeast Asian government organization since at least…

2 years ago

The Threat of Espionage on Linux Systems is Growing and Can’t be Ignored

Security companies have historically focused on espionage incidents related to Windows systems. This has led to them overlooking similar threats…

2 years ago

British Columbia Discloses Multiple ‘Cybersecurity Incidents’ Impacting Government Networks

British Columbia in Canada has faced multiple "sophisticated cybersecurity incidents" on government networks, province premier said this week. Premier David…

2 years ago

TransparentTribe: The Elusive Threat Targeting India’s Defense Sector

The threat actor's approach mirrors its name complexity, beginning with gathering sensitive data, conducting cyber espionage, and compromising targets' security.

2 years ago

Warfront Reporting: The Risks and Responsibilities of Cybersecurity Journalism

Cybersecurity journalism during wartime is one of the most dangerous parts of a journalist's work. Earlier, war crimes included spying…

2 years ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More