New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations
Oct 06, 2025Ravie LakshmananNetwork Security / Cyber Espionage A Chinese company named the Beijing Institute of Electronics Technology and Application...
Read more →Oct 06, 2025Ravie LakshmananNetwork Security / Cyber Espionage A Chinese company named the Beijing Institute of Electronics Technology and Application...
Read more →Oct 06, 2025Ravie LakshmananMalware / Data Breach Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that...
Read more →In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect...
Read more →Oct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day...
Read more →Oct 06, 2025Ravie LakshmananVulnerability / Threat Intelligence Oracle has released an emergency update to address a critical security flaw in...
Read more →Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting...
Read more →Oct 04, 2025Ravie LakshmananVulnerability / Network Security Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike...
Read more →A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer....
Read more →The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their...
Read more →Oct 03, 2025Ravie LakshmananMalware / Online Security Brazilian users have emerged as the target of a new self-propagating malware that...
Read more →Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity...
Read more →Oct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps with a hacking group called YoroTrooper...
Read more →