Tag: espionage
Chinese Keyboard Apps Open 1B People to Eavesdropping
Nearly all keyboard apps that allow users to enter Chinese characters into their Android, iOS, or other mobile devices are vulnerable to attacks that...
Breaking News
VPNs, Firewalls’ Nonexistent Telemetry Lures APTs
Earlier this year, Mandiant Consulting's incident response team tracked an attack by a China-linked espionage group back to the compromise of an edge device...
FBI Director Wray Issues Dire Warning on China’s Cybersecurity Threat
FBI Director Christopher Wray this week delivered what might be the starkest warning yet on the threat that China-backed hackers pose to US national...
AI Lowers Barrier for Cyber-Adversary Manipulation in 2024 Election
COMMENTARYForeign adversaries have attempted to disrupt the US elections for years through various methods. This includes espionage and "hack and leak" campaigns that steal sensitive...
AI Lowers Barrier for Cyber-Adversary Manipulation in 2024 Election
COMMENTARYForeign adversaries have attempted to disrupt the US elections for years through various methods. This includes espionage and "hack and leak" campaigns that steal sensitive...
Sandworm Is Russia’s Top Cyberattack Unit in Ukraine
The formidable Sandworm hacker group has played a central role supporting Russian military objectives in Ukraine over the past two years even as it...
Middle East Cyber Ops Intensify, With Israel the Main Target
As tensions in the Middle East continue to escalate, cyberattacks and operations have become a standard part of the fabric of the geopolitical conflict.Last...
Unwanted eXotic visitors – Week in security with Tony Anscombe
Video
Almost 400 people in India and Pakistan have fallen victim to an...
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
This month, MITRE will be adding two sub-techniques to its ATT&CK database that have been widely exploited by North Korean threat actors.The first, not...
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
ESET researchers have discovered an active espionage campaign targeting Android users with apps primarily posing as messaging services. While these apps offer functional services...
7 reasons why cybercriminals want your personal data
Whenever we’re online, we leave a trail of data behind. As our lives are increasingly intertwined with digital technology, our digital footprints continue to...
CISO Corner: Ivanti’s Mea Culpa; World Cup Hack; CISOs & Cyber-Awareness
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...