UAT-10362 Uses LucidRook Malware In Spear Phishing Campaigns Against Taiwanese NGOs
A new threat cluster UAT-10362 is targeting Taiwanese NGOs with LucidRook malware in spear phishing attacks using DLL side loading and Lua based payload execution.
A new threat cluster UAT-10362 is targeting Taiwanese NGOs with LucidRook malware in spear phishing attacks using DLL side loading and Lua based payload execution.
A long-running cyber espionage campaign targeting Southeast Asian military networks reveals how stealthy cyber operations are used to gather strategic intelligence from modern defense infrastructure.
Detailed analysis of SloppyLemming’s espionage campaign revealing BurrowShell backdoor and Rust‑based RAT targeting government and infrastructure in Pakistan and Bangladesh.
US investigators are examining a cyber intrusion into an FBI internal network linked to surveillance orders, with early findings pointing to hackers associated with the Chinese government.
Researchers reveal Iran linked MuddyWater hackers used a new MuddyViper backdoor in cyber espionage attacks targeting academia, technology, manufacturing and public sector organizations.
Germany’s BfV and BSI issue a joint advisory regarding a sophisticated phishing campaign on Signal targeting politicians, military leaders, and journalists through social engineering.
Security researchers uncover LOTUSLITE backdoor campaign targeting U.S. government and policy entities with Venezuela-themed spear phishing, employing DLL side-loading and remote command capabilities.
Russia aligned threat actor UAC-0184 has expanded its cyber espionage operations against Ukrainian military and government entities by abusing the Viber messaging platform to distribute malware leading to Remcos RAT infections.
Kaspersky reports that China-linked APT group Evasive Panda conducted DNS poisoning attacks from 2022 to 2024, deploying MgBot malware to steal data and maintain long-term persistence.
Cybersecurity researchers reveal active phishing campaigns targeting Russian organizations using malicious ISO files to deploy Phantom Stealer and AdaptixC2 implants across multiple sectors.