How Hive0154 (Mustang Panda) Uses Geopolitical Lures to Target the Tibetan Community: What You Need to Know
|

How Hive0154 (Mustang Panda) Uses Geopolitical Lures to Target the Tibetan Community: What You Need to Know

Imagine opening an email that looks like it’s from a trusted Tibetan organization—maybe it contains an official-looking document about the Dalai Lama’s upcoming milestone birthday or a hot-button issue in Tibetan education policy. But with a single click, you’ve unwittingly invited a stealthy cyberespionage group into your computer—one known to operate on behalf of Chinese…

AI Evasion Malware: How Hackers Are Trying to Trick Language Models (And What It Means for Cybersecurity)
|

AI Evasion Malware: How Hackers Are Trying to Trick Language Models (And What It Means for Cybersecurity)

Imagine this: a piece of malware so cunning, it doesn’t just hide from traditional antivirus programs—it tries to outsmart the artificial intelligence (AI) systems designed to catch it. Sounds like something from a sci-fi thriller, right? But it’s happening now, and it’s reshaping the landscape of cybersecurity. In June 2025, Check Point Research discovered a…