Chinese State-Sponsored Hacker Arrested in Milan: How COVID-19 Research Became a Prime Target
|

Chinese State-Sponsored Hacker Arrested in Milan: How COVID-19 Research Became a Prime Target

Imagine waking up to discover that the very research meant to save lives during a global pandemic was quietly siphoned off by shadowy hackers, acting at the behest of a foreign government. It sounds like a plot straight out of a Hollywood thriller—but for American universities, immunologists, and government agencies, this nightmare was all too…

DoNot APT Expands Its Reach: LoptikMod Malware Targets European Foreign Ministries
|

DoNot APT Expands Its Reach: LoptikMod Malware Targets European Foreign Ministries

When a stealthy hacker group shifts its sights from familiar hunting grounds to the heart of European diplomacy, you know it’s time to pay attention. In 2024, cybersecurity experts sounded the alarm: an advanced persistent threat (APT) group known as DoNot Team—with roots in South Asia and possible ties to India—has ramped up operations, deploying…

North American APT Exploits Microsoft Exchange Zero-Day to Breach Chinese Targets: What This Means for Global Cybersecurity
|

North American APT Exploits Microsoft Exchange Zero-Day to Breach Chinese Targets: What This Means for Global Cybersecurity

In the world of cyber espionage, roles are constantly shifting. For years, headlines have warned us of Chinese hackers infiltrating US and Canadian networks, stealing secrets, and sparking geopolitical tension. But what happens when the tables turn—when a sophisticated threat actor from North America infiltrates the heart of China’s most guarded technological sectors using a…

Taiwan Warns: TikTok, Weibo, and RedNote Pose Serious Data Risks Due to China Ties—Here’s What You Need to Know
|

Taiwan Warns: TikTok, Weibo, and RedNote Pose Serious Data Risks Due to China Ties—Here’s What You Need to Know

Are you worried about where your personal data goes every time you open TikTok or scroll through Weibo? You’re not alone—and Taiwan’s National Security Bureau (NSB) is ringing the alarm bells louder than ever. This isn’t just another news headline. It’s a wake-up call for anyone who uses popular Chinese-developed apps. The NSB’s recent warning…

NightEagle APT: How a Shadowy Hacking Group Exploited Microsoft Exchange Flaws to Target China’s Military and Tech Sectors
|

NightEagle APT: How a Shadowy Hacking Group Exploited Microsoft Exchange Flaws to Target China’s Military and Tech Sectors

What happens when a stealthy, sophisticated hacking group turns its gaze toward some of the world’s most sensitive targets? If you care about cybersecurity, global defense, or even the future of technology, you’ll want to pay close attention to NightEagle—a newly identified advanced persistent threat (APT) that has caught the attention of experts and government…

Taiwan Raises Alarm: Chinese Apps Like TikTok and WeChat Pose Serious Data Security Risks
|

Taiwan Raises Alarm: Chinese Apps Like TikTok and WeChat Pose Serious Data Security Risks

Have you ever wondered what really happens to your personal data when you use popular Chinese apps like TikTok, WeChat, or Baidu Cloud? If you’re in Taiwan—or just care about privacy in an increasingly digital world—you’re not alone. The Taiwanese government has sounded a loud alarm, warning its citizens: the risks may be far greater,…

Chinese State Hackers Exploit Ivanti Zero-Day Flaws to Breach French Organizations: What You Need to Know
|

Chinese State Hackers Exploit Ivanti Zero-Day Flaws to Breach French Organizations: What You Need to Know

If you manage IT security or simply care about the safety of your organization’s digital world, the latest wave of cyberattacks out of France is a wake-up call you can’t afford to snooze. In a campaign that sounds like it leapt out of a cyber-thriller, Chinese state-linked hackers have been systematically exploiting zero-day vulnerabilities in…

china usa hacking back
| |

China Accuses the U.S. of Hacking Back Amid Cyber Conflict

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More Introduction The cyber conflict between the United States and China has escalated significantly in 2024, with both nations accusing each other of engaging in cyber espionage and critical infrastructure attacks. While the U.S….

a helicopter flying in the air over a mountain
|

Spies and Lies: Unmasking China’s Covert Operations

Join our weekly newsletters for the latest updates and exclusive content on industry-leading AI, InfoSec, Technology, Psychology, and Literature coverage. Learn More The Background of China’s Influence Operations The historical context of China’s Ministry of State Security (MSS) reveals a complex narrative shaped by changing political landscapes and strategic interests. Established in the early years…