Generative Data Intelligence

Tag: espionage

Chinese Keyboard Apps Open 1B People to Eavesdropping

Nearly all keyboard apps that allow users to enter Chinese characters into their Android, iOS, or other mobile devices are vulnerable to attacks that...

Top News

VPNs, Firewalls’ Nonexistent Telemetry Lures APTs

Earlier this year, Mandiant Consulting's incident response team tracked an attack by a China-linked espionage group back to the compromise of an edge device...

FBI Director Wray Issues Dire Warning on China’s Cybersecurity Threat

FBI Director Christopher Wray this week delivered what might be the starkest warning yet on the threat that China-backed hackers pose to US national...

AI Lowers Barrier for Cyber-Adversary Manipulation in 2024 Election

COMMENTARYForeign adversaries have attempted to disrupt the US elections for years through various methods. This includes espionage and "hack and leak" campaigns that steal sensitive...

AI Lowers Barrier for Cyber-Adversary Manipulation in 2024 Election

COMMENTARYForeign adversaries have attempted to disrupt the US elections for years through various methods. This includes espionage and "hack and leak" campaigns that steal sensitive...

Sandworm Is Russia’s Top Cyberattack Unit in Ukraine

The formidable Sandworm hacker group has played a central role supporting Russian military objectives in Ukraine over the past two years even as it...

Middle East Cyber Ops Intensify, With Israel the Main Target

As tensions in the Middle East continue to escalate, cyberattacks and operations have become a standard part of the fabric of the geopolitical conflict.Last...

Unwanted eXotic visitors – Week in security with Tony Anscombe

Video Almost 400 people in India and Pakistan have fallen victim to an...

DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse

This month, MITRE will be adding two sub-techniques to its ATT&CK database that have been widely exploited by North Korean threat actors.The first, not...

eXotic Visit campaign: Tracing the footprints of Virtual Invaders

ESET researchers have discovered an active espionage campaign targeting Android users with apps primarily posing as messaging services. While these apps offer functional services...

7 reasons why cybercriminals want your personal data

Whenever we’re online, we leave a trail of data behind. As our lives are increasingly intertwined with digital technology, our digital footprints continue to...

CISO Corner: Ivanti’s Mea Culpa; World Cup Hack; CISOs & Cyber-Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?