HomeCyber BalkansCyberespionage by Multiple Intelligence Services, Some Outsourced, and Update on Cyber Underworld,...

Cyberespionage by Multiple Intelligence Services, Some Outsourced, and Update on Cyber Underworld, CPU Vulnerabilities, and Patch Tuesday Notes.

Published on

spot_img

In recent news, reports have emerged about a wide-ranging cyberespionage campaign carried out by China’s Ministry of State Security. This campaign has targeted at least 17 countries across Asia, Europe, and North America, as reported by The Record. The Chinese hackers behind the campaign, known as RedHotel, are believed to be a state-sponsored group operating at a global scale, according to Recorded Future.

One of the tools used in this cyberespionage campaign is the EvilProxy phishing tool, which specifically targets executives and has the ability to defeat multifactor authentication. Proofpoint has discovered that this tool is being leveraged in a cloud account takeover campaign, targeting top-level executives at over 100 global organizations.

In addition to the Chinese cyberattacks, vulnerabilities in CPUs have been a cause for concern. A vulnerability known as ‘Downfall’ has left billions of Intel CPUs at risk, as reported by CyberScoop. This vulnerability could potentially be exploited by threat actors to gain unauthorized access to sensitive data. Furthermore, a new attack called Inception has been discovered, which leaks sensitive data from all AMD Zen CPUs, according to BleepingComputer.

Ransomware attacks have also been making headlines, with a new variant called Yashma targeting multiple English-speaking countries, as reported by The Hacker News. This ransomware has the potential to cause significant damage and financial loss to its victims.

In the realm of election security, there are suspicions of a Russian attempt to disrupt British elections. The Telegraph reports that Russia is the top suspect in a cyber attack that exposed the data of 40 million UK voters. The Electoral Commission has confirmed that its registers were targeted by hostile hackers, according to the Guardian. However, the extent of the damage and the motives behind the attack are still being investigated.

Switching gears to cybersecurity conferences, the Black Hat conference has been a hub for experts in the industry to share insights and discussions. Rob Boyce from Accenture participated in the conference and provided updates on the latest cybersecurity trends and threats.

In a conversation with Maria Varmazis, representatives from the Black Hat Aerospace Village, Kaylin Trychon and Steve Luczynski, discussed the importance of securing aviation systems from cyber threats. They highlighted the vulnerabilities that exist within critical infrastructure and the potential consequences of a successful cyber attack.

On the international front, Ukraine claims to have stopped a Russian spyware campaign that targeted its armed forces’ combat system, as reported by Reuters. The country’s military tablets were also subjected to a hacking attempt by a group known as Sandworm, according to The Record.

Meanwhile, Patch Tuesday – the monthly release of security updates by major software vendors – has come and gone, but the vulnerabilities still remain unless the patches have been applied. Adobe and Microsoft both released security updates to address multiple vulnerabilities in their products, as highlighted by SecurityWeek and the Cybersecurity and Infrastructure Security Agency (CISA).

In conclusion, this recent wave of cyberespionage campaigns, CPU vulnerabilities, ransomware attacks, and election disruptions has underscored the importance of robust cybersecurity measures. Organizations and individuals must remain vigilant, apply necessary patches, and implement best practices to protect themselves from the ever-evolving cyber threats.

Source link

Latest articles

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...

Why IT Leaders Must Rethink Backup in the Age of Ransomware

 With IT outages and disruptions escalating, IT teams are shifting their focus beyond...

More like this

Anubis Ransomware Now Hitting Android and Windows Devices

 A sophisticated new ransomware threat has emerged from the cybercriminal underground, presenting a...

Real Enough to Fool You: The Evolution of Deepfakes

Not long ago, deepfakes were digital curiosities – convincing to some, glitchy to...

What Happened and Why It Matters

In June 2025, Albania once again found itself under a digital siege—this time,...