News
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for ...
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called ...
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control ...
A new report reveals that Chinese state-backed hacking group APT41 has developed a novel method to conduct cyber-espionage by ...
Google found Chinese hackers abusing Google Calendar The service was used to host malicious instructions and to exfiltrate ...
Google senior security engineer Patrick Whitsell published research on May 28 regarding APT41, a Chinese state-sponsored espionage group also known as "Double Dragon." The group's activities are ...
China-linked hackers used Google Calendar as a command and control (C2) channel to steal data from infected devices.
The infection begins with spear-phishing emails that direct victims to a malicious ZIP archive hosted on a hijacked ...
The U.S. government loses hundreds of billions to fraud each year, with criminals using stolen identities to make ...
Hosted on MSN10mon
China's APT41 crew adds a stealthy malware loader and fresh backdoor to its toolboxChinese government-backed cyber espionage gang APT41 has very likely added a loader dubbed DodgeBox and a backdoor named MoonWalk to its malware toolbox, according to cloud security service ...
The Chinese state-backed APT41 hacking group is targeting Android devices with two newly discovered spyware strains dubbed WyrmSpy and DragonEgg by Lookout security researchers. APT41 is one of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results