Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 6
107 résultats taggé China  ✕
Stop Calling Online Scams ‘Pig Butchering,’ Interpol Warns https://www.wired.com/story/interpol-pig-butchering-scams-rename/
18/12/2024 06:48:42
QRCode
archive.org
thumbnail

Experts say the catchall term for online fraud furthers harm against victims and could dissuade people from reporting attempts to bilk them out of their money.

wired en 2024 china crime hacks security cryptocurrency PigButchering name Interpol victim shaming
At least 8 US telcos, dozens of countries impacted by Salt Typhoon breaches, White House says | The Record from Recorded Future News https://therecord.media/eight-telcos-breached-salt-typhoon-nsc
05/12/2024 16:49:26
QRCode
archive.org
thumbnail

Senators briefed on the wide-ranging breaches by Chinese hackers called for action on Wednesday to protect the country's telecommunications networks.

therecord.media EN 2024 telcos US Salt-Typhoon China breaches
The hidden network report https://research.cert.orangecyberdefense.com/hidden-network/report.html
28/11/2024 08:27:03
QRCode
archive.org

Since February 2024, the World Watch Cyber Threat Intelligence team has been working on an extensive study of the private and public relationships within the Chinese cyber offensive ecosystem. This includes:

  • An online map showcasing the links between 300+ entities;
  • Historical context on the Chinese state entities dedicated to cyber offensive operations;
  • An analysis of the role of universities and private companies in terms of capacity building;
  • A focus on the ecosystem facilitating the acquisition of vulnerabilities for government use in cyber espionage campaigns.
Orange Cyberdefense CERT EN 2024 Threat Research China
Emerging Details of Chinese Hack Leave U.S. Officials Increasingly Concerned https://www.nytimes.com/2024/11/22/us/politics/chinese-hack-telecom-white-house.html
25/11/2024 16:13:27
QRCode
archive.org

Leaders of the big telecommunications companies were summoned to the White House to discuss strategies for overhauling the security of the nation’s telecommunications networks amid growing alarm at the scope of a Chinese hack.

nytimes EN 2024 China US telecom Officials Salt-Typhoon
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike https://www.recordedfuture.com/research/china-nexus-tag-112-compromises-tibetan-websites
24/11/2024 10:04:10
QRCode
archive.org
thumbnail

In a recent cyber campaign, the Chinese state-sponsored threat group TAG-112 compromised two Tibetan websites, Tibet Post and Gyudmed Tantric University, to deliver the Cobalt Strike malware. Recorded Future’s Insikt Group discovered that the attackers embedded malicious JavaScript in these sites, which spoofed a TLS certificate error to trick visitors into downloading a disguised security certificate. This malware, often used by threat actors for remote access and post-exploitation, highlights a continued cyber-espionage focus on Tibetan entities. TAG-112’s infrastructure, concealed using Cloudflare, links this campaign to other China-sponsored operations, particularly TAG-102 (Evasive Panda).

recordedfuture EN 2024 EvasivePanda TAG-112 Tibet China CobaltStrike malware
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/11/22/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon/
22/11/2024 14:09:27
QRCode
archive.org
thumbnail

At CYBERWARCON 2024, Microsoft Threat Intelligence analysts will share research and insights on North Korean and Chinese threat actors representing years of threat actor tracking, infrastructure monitoring and disruption, and their attack tooling.

microsoft EN 2024 CYBERWARCON DPRK North-Korea China analysis intlligence
Seeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations https://cloud.google.com/blog/topics/threat-intelligence/glassbridge-pro-prc-influence-operations/?hl=en
22/11/2024 14:05:56
QRCode
archive.org
thumbnail

GLASSBRIDGE is an umbrella group of four different companies that operate networks of inauthentic news sites and newswire services.

Mandiant EN 2024 GLASSBRIDGE fake news newswire services Haixun fake-news China
T-Mobile confirms it was hacked in recent wave of telecom breaches https://www.bleepingcomputer.com/news/security/t-mobile-confirms-it-was-hacked-in-recent-wave-of-telecom-breaches/
16/11/2024 18:57:02
QRCode
archive.org
thumbnail

T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests.

bleepingcomputer EN 2024 China Cyber-espionage Cyberattack Salt-Typhoon T-Mobile Telecommunications Security InfoSec Computer-Security
China's Volt Typhoon breached Singtel, reports say https://www.theregister.com/2024/11/06/chinas_volt_typhoon_breached_singtel/
13/11/2024 11:24:57
QRCode
archive.org
thumbnail

Chinese government cyberspies Volt Typhoon reportedly breached Singapore Telecommunications over the summer as part of their ongoing attacks against critical infrastructure operators.

The digital break-in was discovered in June, according to Bloomberg, citing "two people familiar with the matter" who told the news outlet that the Singtel breach was "a test run by China for further hacks against US telecommunications companies."

theregister EN 2024 VoltTyphoon China Singtel breach spy
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/
01/11/2024 16:05:21
QRCode
archive.org
thumbnail

Sophos went so far as to plant surveillance “implants” on its own devices to catch the hackers at work—and in doing so, revealed a glimpse into China's R&D pipeline of intrusion techniques.

cybersecurity hacking malware vulnerabilities security china
Exclusive: Chinese researchers develop AI model for military use on back of Meta's Llama https://www.reuters.com/technology/artificial-intelligence/chinese-researchers-develop-ai-model-military-use-back-metas-llama-2024-11-01/
01/11/2024 09:24:34
QRCode
archive.org
  • Papers show China reworked Llama model for military tool
  • China's top PLA-linked Academy of Military Science involved
  • Meta says PLA 'unauthorised' to use Llama model
  • Pentagon says it is monitoring competitors' AI capabilities
reuters EN China Llama model military tool Meta AI LLM Pentagon
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/
31/10/2024 16:27:18
QRCode
archive.org
thumbnail

Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices

sophos EN 2024 investigation China-based perimeter devices TTPs China APT
Inside the Open Directory of the “You Dun” Threat Group https://thedfirreport.com/2024/10/28/inside-the-open-directory-of-the-you-dun-threat-group/
28/10/2024 10:34:07
QRCode
archive.org
  • Analysis of an open directory found a Chinese speaking threat actor’s toolkit and history of activity.
  • The threat actor displayed extensive scanning and exploitation using WebLogicScan, Vulmap, and Xray, targeting organizations in South Korea, China, Thailand, Taiwan, and Iran.
  • The Viper C2 framework was present as well as a Cobalt Strike kit which included TaoWu and Ladon extensions.
  • The Leaked LockBit 3 builder was used to create a LockBit payload with a custom ransom note that included reference to a Telegram group which we investigated further in the report.
thedfirreport EN 2024 Analysis open-directory LockBit operational You-Dun group China tools scan
Chinese Hackers Are Said to Have Targeted Phones Used by Trump and Vance https://www.nytimes.com/2024/10/25/us/politics/trump-vance-hack.html?unlocked_article_code=1.U04.dkDJ.2aP0tmFEROpJ&smid=url-share
26/10/2024 12:59:39
QRCode
archive.org

The targeting of the Republican presidential ticket’s phones is part of what appears to be a wide-ranging effort to gather information about American leaders.

nytimes EN 2024 US presidential China Verizon intelligence-collection
U.S. Wiretap Systems Targeted in China-Linked Hack https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b?st=C5ywbp&reflink=desktopwebshare_permalink
06/10/2024 14:24:37
QRCode
archive.org

AT&T and Verizon are among the broadband providers that were breached

wsj EN 2024 US China AT&T Verizon wiretap breached
China urges netizens to be vigilant against Taiwanese cyberattacks https://www.japantimes.co.jp/news/2024/09/23/asia-pacific/politics/china-netizens-taiwanese-cyberattacks/
23/09/2024 07:27:23
QRCode
archive.org
thumbnail

The hacking group's X account shared videos comparing Xi Jinping to an emperor and others commemorating the 1989 Tiananmen Square demonstrations.

japantimes EN 2024 Taiwan hacking China cyberattacks
Chinese APT Abuses VSCode to Target Government in Asia https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/
14/09/2024 12:35:33
QRCode
archive.org
thumbnail

A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage. A first in our telemetry: Chinese APT Stately Taurus uses Visual Studio Code to maintain a reverse shell in victims' environments for Southeast Asian espionage.

unit42 EN 2024 China APT StatelyTaurus VisualStudio
Routers from China-based TP-Link a national security threat, US lawmakers claim https://therecord.media/routers-from-tp-link-security-commerce-department
20/08/2024 09:16:28
QRCode
archive.org
thumbnail

The two members of Congress called on the Commerce Department to investigate risks related to TP-Link routers amid concerns over state-backed Chinese hacking operations.

therecord.media EN 2024 TP-Link US China national-threat threat state-backed
Germany to ban Chinese companies' components from core parts of its 5G networks | AP News https://apnews.com/article/germany-china-huawei-zte-ban-5g-networks-fc969a68958f4a4b928ce0f8a1c32087?ref=news.risky.biz
18/07/2024 10:03:42
QRCode
archive.org
thumbnail

Germany's top security official says the country will bar the use of critical components made by Chinese companies Huawei and ZTE in core parts of its 5G networks in two steps starting in 2026.

apnews EN 2024 Germany ban China critical-components 5G
Chinese APT40 hackers hijack SOHO routers to launch attacks https://www.bleepingcomputer.com/news/security/chinese-apt40-hackers-hijack-soho-routers-to-launch-attacks/
10/07/2024 17:40:13
QRCode
archive.org
thumbnail

An advisory by CISA and multiple international cybersecurity agencies highlights the tactics, techniques, and procedures (TTPs) of APT40 (aka

bleepingcomputer 2024 EN APT40 Australia China CISA Router Security-Advisory SOHO-Router
page 2 / 6
4250 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio