Headlines
China Denies Hacking Allegations, Accuses US of Cybersecurity Industry Targetingcybersecurity,hacking,China,US,allegations,targeting

China Denies Hacking Allegations, Accuses US of Cybersecurity Industry Targeting

China Dismisses Hacking Report and Accuses US of Targeting Cybersecurity Industry China‘s Rejection of Hacking Report China‘s government has rejected a report by a US security firm that accuses Chinese-linked hackers of carrying out cyberattacks on public agencies, schools, and other targets globally. The report, released by Mandiant, alleges that China was behind the exploitation…

Read More
The Growing Threat of Bulletproof Hosting Services: Romanian Operator Sentenced to Prison in USbulletproofhosting,cybercrime,Romania,prisonsentence,US

The Growing Threat of Bulletproof Hosting Services: Romanian Operator Sentenced to Prison in US

Cybercriminal Operator of Bulletproof Hosting Services Sentenced to Prison in US A Romanian dual national who ran a bulletproof hosting service, Mihai Ionut Paunescu, has been sentenced to three years in prison in the United States. He was also ordered to pay $3.5 million forfeiture and roughly $19,000 in restitution. Paunescu was arrested in 2021…

Read More
Inside the CL0P ransomware attacks: Key technical details revealed by US cyber officialsransomware,CL0P,cyberattacks,US,technicaldetails

Inside the CL0P ransomware attacks: Key technical details revealed by US cyber officials

US Cyber Officials Offer Technical Details Associated with CL0P Ransomware Attacks On June 2, 2023, the CL0P ransomware group compromised a popular file sharing service by exploiting a previously undetected vulnerability in the MOVEit Transfer file transfer software, exposing hundreds of companies worldwide to further attacks. The US government’s top cybersecurity agency and the FBI…

Read More
"Securing Remote Access Software: Insights from US and Israel"cybersecurity,remoteaccess,software,US,Israel

“Securing Remote Access Software: Insights from US and Israel”

US and Israel Issue Guidance on Securing Remote Access Software The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Israel National Cyber Directorate (INCD), has released a joint Guide to Securing Remote…

Read More
Inside North Korea’s Social Engineering Techniques: Insights from US and South KoreaNorthKorea,socialengineering,US,SouthKorea,insights.

Inside North Korea’s Social Engineering Techniques: Insights from US and South Korea

Cyberwarfare US, South Korea Detail North Korea’s Social Engineering Techniques North Korea has a notorious history of cyberattacks and is now targeting the employees of think tanks, academic and research institutions as well as news media organizations. According to a joint advisory by the United States and South Korea, the North Korean threat actors use…

Read More
Russia accuses US Intelligence of orchestrating iOS Zero-Click Attackscybersecurity,Russia,US,intelligence,iOS,zero-clickattacks,hacking

Russia accuses US Intelligence of orchestrating iOS Zero-Click Attacks

Russian cybersecurity firm Kaspersky has publicly disclosed an advanced persistent threat (APT) actor launching zero-click iMessage exploits on iOS-powered devices in its corporate network. This came on the same day that Russia‘s Federal Security Service (FSB) blamed US intelligence agencies for an ongoing spy campaign targeting thousands of iOS devices belonging to domestic subscribers and foreign…

Read More
The Alarming Rise of Undetected Chinese Hackers in US and Guam Critical Infrastructurecybersecurity,China,hacking,US,Guam,criticalinfrastructure

The Alarming Rise of Undetected Chinese Hackers in US and Guam Critical Infrastructure

Perimeter 81’s Network Security Platform In today’s world, cybersecurity is of growing concern for individuals and businesses alike. Cyber attacks are becoming more frequent and sophisticated, and as such, network security is crucial to protect online data and assets. Perimeter 81’s network security platform is an efficient solution that can help IT managers save time…

Read More
How the Chinese-backed APT group 'Volt Typhoon' infiltrated US critical infrastructure organizationscybersecurity,APT,VoltTyphoon,Chinese-backed,US,criticalinfrastructure,infiltration

How the Chinese-backed APT group ‘Volt Typhoon’ infiltrated US critical infrastructure organizations

Microsoft Warns of China-Backed APT Infiltrating US Critical Infrastructure Microsoft has reported an active threat group, dubbed “Volt Typhoon,” sponsored by China that has gained persistent access to telecom and other critical infrastructure networks in the US with a focus on espionage and potentially, cyber warfare. The group, which has previously been observed in cyber…

Read More
US and Guam's critical infrastructure under attack by Chinese-linked hackerscybersecurity,US,Guam,criticalinfrastructure,Chinesehackers,cyberattack

US and Guam’s critical infrastructure under attack by Chinese-linked hackers

Chinese-linked hackers have been discovered by Microsoft and US intelligence agencies targeting critical infrastructure entities in the United States and Guam. The hacking campaign, which has been active since mid-2021, has been dubbed “Volt Typhoon” by Microsoft, who assess that the attacks could lay the groundwork for disrupting communications between the US and Asia in…

Read More