by Beck Bailey | Jun 27, 2025 | RSS
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups. The Operational Relay Box (ORB)...
by Beck Bailey | Jun 27, 2025 | RSS
A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks leveraged topics related to Tibet, such as the 9th World Parliamentarians’ Convention on...
by Beck Bailey | Jun 27, 2025 | RSS
Fake crypto and TikTok apps are being used to spread SparkKitty spyware on Android and iOS, silently stealing user photos and device data.
by Beck Bailey | Jun 27, 2025 | RSS
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s security leaders are expected to reduce risk and deliver results without relying on larger...
by Beck Bailey | Jun 27, 2025 | RSS
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and DeepSeek to deliver Sainbox RAT and the open-source Hidden rootkit. The activity has been attributed with medium confidence to a Chinese hacking group...
Recent Comments