Group Policy abuse reveals China-aligned espionage group targeting governments

ESET Research has identified a previously undocumented China-aligned advanced persistent threat group that uses Windows Group Policy to deploy malware and move through victim networks. The group, tracked as LongNosedGoblin, has targeted government inst… Continue reading Group Policy abuse reveals China-aligned espionage group targeting governments

Chinese Hackers Breach Cisco’s Email Security Systems

The Chinese threat group, tracked as UAT-9686, has deployed a collection of custom-built hacking tools to maintain persistent access to compromised systems.
The post Chinese Hackers Breach Cisco’s Email Security Systems appeared first on TechRepublic.
Continue reading Chinese Hackers Breach Cisco’s Email Security Systems

Concentric AI expands Private Scan Manager with Azure support for regulated industries

Concentric AI announced expanded Private Scan Manager functionality in its Semantic Intelligence data security governance platform. Customers now have the ability to deploy Semantic Intelligence within their own private Microsoft Azure cloud. This foll… Continue reading Concentric AI expands Private Scan Manager with Azure support for regulated industries

Positive trends related to public IP ranges from the year 2025, (Thu, Dec 18th)

Since the end of the year is quickly approaching, it is undoubtedly a good time to look back at what the past twelve months have brought to us… And given that the entire cyber security profession is about protecting various systems from “bad things” (and we’ve all correspondingly seen more than our share of the “bad”), I thought that it might be pleasant to look at a few positive background trends that have accompanied us throughout the year, without us necessarily noticing…

Continue reading Positive trends related to public IP ranges from the year 2025, (Thu, Dec 18th)

Posted in Uncategorized

Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

The North Korean threat actor known as Kimsuky has been linked to a new campaign that distributes a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics (formerly CJ Korea… Continue reading Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App

Posted in Uncategorized