News

⚡ Threat of the Week APT41 Exploits Google Calendar for Command-and-Control — The Chinese state-sponsored threat actor known as APT41 deployed a malware called TOUGHPROGRESS that uses Google Calendar ...
This post is also available in: עברית (Hebrew)A new report reveals that Chinese state-backed hacking group APT41 has developed a novel method to conduct cyber-espionage by exploiting Google Calendar ...
In a concerning revelation, Google’s Threat Intelligence Group (GTIG) has uncovered that a group of hackers linked to China used Google Calendar as a tool to steal sensitive information from ...
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for command-and-control (C&C), Google warns. Also tracked as Barium, Winnti, Wicked ...
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech ...
Hacking group APT41 is exploiting Google Calendar to conduct command-and-control (C2) operations using a newly identified malware called TOUGHPROGRESS, according to Google’s Threat Intelligence ...
Google's Threat Intelligence Group (GTIG) has announced that it has discovered that the Chinese government-backed hacker group 'APT41' has used malware to write encrypted commands to Google ...