PlushDaemon APT targets South Korean VPN with SlowStepper backdoor. Multistage DNS C&C protocol aids espionage.
A malicious Android application disguised as a chat platform has been linked to the Indian Advanced Persistent Threat (APT) ...
Advanced persistent threats (APTs) use sophisticated tools and techniques to breach systems and maintain access—all while remaining undetected. Unlike other cyberattacks, APTs work over an extended ...
A Chinese state-sponsored cyberattack breached the US Treasury, exploiting vulnerabilities in third-party software. Workstations and unclassified documents were accessed, sparking federal action and ...
Chinese state-backed hackers, tracked as Silk Typhoon, have been linked to the U.S. Office of Foreign Assets Control (OFAC) ...
In December 2024, the US Bureau of Industry and Security imposed a new set of export controls on Chinese companies, escalating tensions between the two countries to a new level. After Beijing ...
As the political landscape heats up, so does the activity in the cyber threat domain. High-profile events such as ...
This is a developing compendium, and we will update it regularly. An advanced persistent threat (APT) is often categorized as a hacker, or group of hackers, which gains and maintains unauthorized ...
The Russian cyber spy operation known as Star Blizzard changed tactics after a takedown operation by Microsoft and the US ...
Now, the Silk Typhoon APT has been linked to the US Treasury cyber attack. In a report by Bloomberg, threat actors from the ...
Elon Musk, the world’s richest man, shared his intent to fix the US government’s IT department, labeling it more challenging ...