Cyber Espionage | Phishing Attacks | U.S.-China Relations APT41 hackers targeting US trade officials as talks with China approach
Cloud Security Threats | Cyber Espionage | Vulnerability Exploitation Chinese hacker groups Murky, Genesis, and Glacial Panda targeting cloud computing and telecommunications
Cyber Espionage | Malware Delivery | Spear-Phishing Attacks North Korean hackers target diplomats via GitHub spearphishing attack
Credential Theft | Cyber Espionage | Malware Persistence New APT group ‘Curly COMrades’ targeting Georgia and Moldova
Cyber Espionage | Malware Techniques | Social Engineering Kimsuky APT hackers are utilizing LNK files as a means to deploy reflective malware, successfully evading detection by Windows Defender.