![backdoor](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/02170804/backdoor-1-1500-400x200.webp)
China-aligned PlushDaemon APT compromises supply chain of Korean VPN
ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this …
![China](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09132937/china-400x200.webp)
US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks
The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120358/encryption-1400-400x200.jpg)
8 US telcos compromised, FBI advises Americans to use encrypted communications
FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to protect their communications from …
![North Korea](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/17122554/north_korea-offices-400x200.webp)
Active network of North Korean IT front companies exposed
An analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/24144150/usa-flag-1-400x200.jpg)
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and …
![FBI](https://img.helpnetsecurity.com/wp-content/uploads/2024/09/19131427/fbi-botnet-400x200.webp)
FBI forced Flax Typhoon to abandon its botnet
A botnet operated by the Chinese state-sponsored threat actor known as Flax Typhoon has been disrupted by the law enforcement agency and abandoned by the group, FBI Director …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2024/08/05114921/malware-400x200.webp)
Chinese hackers compromised an ISP to deliver malicious software updates
APT StormBamboo compromised a undisclosed internet service provider (ISP) to poison DNS queries and thus deliver malware to target organizations, Volexity researchers have …
![China](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/09132937/china-400x200.webp)
Chinese APT40 group swifly leverages public PoC exploits
Chinese state-sponsored cyber group APT40 is amazingly fast at adapting public proof-of-concept (PoC) exploits for vulnerabilities in widely used software, an advisory …
![Fortinet](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/29114619/fortinet-1500-400x200.webp)
20,000 FortiGate appliances compromised by Chinese hackers
Coathanger – a piece of malware specifically built to persist on Fortinet’s FortiGate appliances – may still be lurking on too many devices deployed worldwide. How …
![cyber threat](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25143238/cyber-threat1-400x200.jpg)
Chinese attackers leverage previously unseen malware for espionage
Sophos released its report, “Operation Crimson Palace: Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia,” which details a …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/15104003/face-1400-400x200.jpg)
iOS users beware: GoldPickaxe trojan steals your facial data
Group-IB uncovered a new iOS trojan designed to steal users’ facial recognition data, identity documents, and intercept SMS. The trojan, dubbed GoldPickaxe.iOS by Group-IB’s …
![Matt Shelton](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/16111231/matt_shelton-2-google-1-400x200.jpg)
Rise in cyberwarfare tactics fueled by geopolitical tensions
In this Help Net Security interview, Matt Shelton, Head of Threat Research and Analysis at Google Cloud, discusses the latest Threat Horizons Report, which provides …
Featured news
Resources
Don't miss
- Mirai botnet behind the largest DDoS attack to date
- 48,000+ internet-facing Fortinet firewalls still open to attack
- Acronis CISO on why backup strategies fail and how to make them resilient
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving