Cyber espionage stories - Page 1

2025 forecast predicts a rise in global cyber threats
Yesterday
#
risk & compliance
#
cybersecurity
#
cyber espionage
The Forum of Incident Response and Security Teams predicts a staggering 45,505 reported vulnerabilities for 2025, marking an 11% rise from 2024.

Cybercrime surges as global threat to national security
This month
#
ransomware
#
email security
#
cybersecurity
Cybercrime has overtaken state-sponsored hacking as the main online threat, with healthcare and energy sectors particularly vulnerable, warns Google.

Cohesity strengthens security with new advisory additions
Last month
#
ransomware
#
advanced persistent threat protection
#
ai
Cohesity enhances its Security Advisory Council with the appointment of Dave DeWalt and H.R. McMaster, aimed at strengthening global data security amid rising cyber threats.

Sophos MDR services protect 26,000 organisations globally
Last month
#
malware
#
firewalls
#
ransomware
Sophos has reported a 37% surge in its Managed Detection and Response services, now safeguarding over 26,000 organisations globally, reflecting rising demand for robust cyber security.

New malware CookiePlus targets nuclear sector workers
Fri, 27th Dec 2024
#
malware
#
advanced persistent threat protection
#
physical security
Kaspersky has unveiled CookiePlus, a malware from North Korean hackers Lazarus, targeting nuclear and defence sectors amid threats of data theft.

CrowdStrike report reveals China-linked cyber threat actor
Wed, 20th Nov 2024
#
malware
#
uc
#
firewalls
CrowdStrike's new report reveals the activities of a Chinese-linked threat actor, LIMINAL PANDA, targeting telecommunications since 2020.

UK warned of cyber threats from China-backed Volt Typhoon
Wed, 20th Nov 2024
#
advanced persistent threat protection
#
cybersecurity
#
fbi
The UK faces increasing cyber threats from China-backed group Volt Typhoon, jeopardising critical infrastructure and national security, warns Certes.

Cyber-espionage group Volt Typhoon resurfaces globally
Tue, 19th Nov 2024
#
advanced persistent threat protection
#
cybersecurity
#
botnet
The return of Volt Typhoon, a state-sponsored cyber-espionage group, threatens global infrastructures, exploiting outdated devices for covert operations.

Rise in ransomware groups reshapes cybersecurity landscape
Thu, 10th Oct 2024
#
malware
#
firewalls
#
ransomware
Secureworks' latest report reveals a 30% rise in active ransomware groups, highlighting evolving cyber threats and increased complexity for network defenders.

Salt Typhoon hacks highlight vulnerabilities to Chinese attacks
Fri, 27th Sep 2024
#
firewalls
#
breach prevention
#
cybersecurity
Recent Salt Typhoon cyberattacks linked to China have infiltrated US critical infrastructure, highlighting severe vulnerabilities in the public and private sectors.

Sophos exposes China-linked cyberespionage in Southeast Asia
Tue, 17th Sep 2024
#
firewalls
#
network security
#
breach prevention
Sophos' latest report uncovers a sophisticated China-linked cyberespionage campaign targeting Southeast Asian entities.

Sophos unveils Chinese cyber espionage tactics in new report
Wed, 11th Sep 2024
#
malware
#
firewalls
#
network security
Sophos has disclosed new insights into the Crimson Palace cyber espionage campaign by Chinese state actors, revealing persistent threats across Southeast Asia.

Cybersecurity fears rise ahead of 2024 Paris Olympics
Fri, 26th Jul 2024
#
uc
#
firewalls
#
ransomware
As the 2024 Paris Olympics near, cybersecurity warnings from Radware, Mandiant, Tenable, and Palo Alto Networks highlight AI-enhanced threats and the need for robust defence strategies.

The new way international politics could affect your life: cyber attacks
Thu, 27th Jun 2024
#
uc
#
ransomware
#
physical security
As global tensions rise, state-sponsored cyber attacks on critical infrastructure could disrupt daily life, from power cuts to stolen personal data.

Pegasus spyware could target iOS devices, says Group-IB
Thu, 21st Mar 2024
#
encryption
#
data privacy
#
personal computing devices
A recent analysis by Group-IB sheds light on the alarming potential of Pegasus spyware, exploring wider implications for the famed security of iOS products.

I-Soon suffers data breach revealing state hacking activities
Fri, 1st Mar 2024
#
breach prevention
#
data breach
#
threat intelligence
A significant data leak at Chinese private security firm I-Soon has exposed the company's alleged hacking activities.

Operation Texonto spreads false war info, reveals ESET Research
Mon, 26th Feb 2024
#
cybersecurity
#
microsoft office 365
#
cyber espionage
Operation Texonto, a disinformation scheme targeting Ukrainians with war-related false information via spam emails, has been discovered by ESET Research.

Half-year surge in cyber attacks on infrastructure, says Dragos
Wed, 21st Feb 2024
#
uc
#
ransomware
#
government
Worldwide cybersecurity expert Dragos reports a 50% surge in politically motivated cyberattacks and new threat clusters targeting critical infrastructure.

Breaking down Australia's Cyber Security Strategy 2023-2030
Thu, 25th Jan 2024
#
iam
#
supply chain & logistics
#
cybersecurity
Australia's Cyber Security Strategy 2023-2030, aimed toward transforming the nation from highly vulnerable to a global cyber risk leader, embarks on its urgent 'Phase One', following a 14% rise in cyber attacks last year.

Ivanti VPN vulnerabilities exploited by suspected espionage group UNC5221
Mon, 15th Jan 2024
#
malware
#
vpns
#
advanced persistent threat protection
Suspected espionage group UNC5221 exploited two zero-day vulnerabilities in Ivanti VPN and security appliances, using multiple custom malware families for post-exploitation espionage.