U.S. President Joe Biden and Chinese President Xi Jinping held a bilateral phone call Tuesday to discuss a range of security issues including threats associated with advanced technologies. Biden was expected to discuss stopping U.S. technologies from being used to undermine U.S. national security.
Hackers are using a new version of a backdoor to target Linux servers and gain and maintain access in what appears to be an espionage campaign, warn researchers from Kaspersky. The hallmark of DinodasRAT's strategy is its sophisticated victim identification and persistence mechanisms.
The U.S. Department of Homeland Security's assistant secretary for cyber, infrastructure, risk and resilience is sounding the alarm over hackers targeting political campaigns ahead of the 2024 elections, warning that campaigns could be left vulnerable if they fail to practice basic cyber hygiene.
Federal regulators are sounding an alarm to warn healthcare sector entities of cyberattacks involving a tried-and-true hacking method - credential harvesting, which can be used to compromise patient data, disrupt healthcare operations and enable other crimes.
Chinese hacking contractor iSoon supported three separate cyberespionage operations on behalf of Beijing, say security researchers who analyzed a leaked data trove belonging to the firm. Details of the inside workings of the previously obscure Chinese hacking-for-hire firm emerged in February.
The Foundation for Defense of Democracies on Monday released a white paper that urges Congress to establish a seventh military branch to serve as an independent armed cyber service amid growing threats in cyberspace from foreign adversaries such as Russia and China.
Chinese state hackers targeted multiple British politicians, the U.K. government said Monday in a coordinated disclosure of Chinese state hacking activities designed to ramp up international pressure on Beijing. The British government summoned the Chinese ambassador to the Foreign Office.
U.S. federal prosecutors indicted seven Chinese nationals they accuse of hacking for a Beijing economic and intelligence espionage group whose operations reacted to geopolitical trends. The suspects allegedly were contractors for a front company set up by an arm of the Ministry of State Security.
Iran-aligned threat actor TA450, also called MuddyWater, is using fake salary, compensation and financial incentive emails to trick Israeli employees at multinational organizations into clicking malicious links, according to researchers at security firm Proofpoint.
A Russian hacking group is targeting German political parties as part of a Moscow-backed espionage campaign. The latest APT29 campaign marks the first time the group has been seen targeting political organizations, according to researchers at Mandiant.
A likely Chinese hacker-for-hire used high-profile vulnerabilities in a campaign targeting a slew of Southeast Asian and U.S. governmental and research organizations, says threat intel firm Mandiant. Rapid exploitation of newly patched flaws has become a hallmark of Chinese threat actors.
U.S. and allied cybersecurity agencies again warned the private sector to guard against Chinese state hackers who eschew malware to maintain access in favor of exploiting built-in system functions. Key preventative measures include maintaining a central logging database.
Major technology vendors keep being hacked by the nation-state hacking group Midnight Blizzard. Essential defenses to combat such attacks begin with implementing log monitoring across multiple platforms to find red flags, said John Fokker, head of threat intelligence at Trellix.
Security researchers say they've spotted a hacking campaign with a strong focus in Southeast Asia that could be the work of Chinese state hacking contractor iSoon, the company whose February internal data leak threw a spotlight on a network of private sector companies hacking on behalf of Beijing.
Authoritarian countries are seizing on technological advances to sway the global balance during a time of increased geopolitical fragility, U.S. intelligence agencies warned in an annual threat assessment. Generative artificial intelligence and biotechnology have high potential for shifting power.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.