News

Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for ...
Google's Threat Intelligence Group revealed that a Chinese hacker group used Google Calendar to steal sensitive information.
"When used together, CAV and crypting services allow criminals to obfuscate malware, making it undetectable and enabling ...
This is not the first sighting of the malware, and the Google Threat Intelligence team claims the first incident of the APT41 hacking group was reported back in October 2024. Now, the same group is ...
A new report reveals that Chinese state-backed hacking group APT41 has developed a novel method to conduct cyber-espionage by ...
The Chinese APT41 hacking group uses a new malware named 'ToughProgress' that abuses Google Calendar for command-and-control (C2) operations, hiding malicious activity behind a trusted cloud service.
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech ...
Security researchers flag two phishing campaigns abusing Firebase and Google Apps Script to host malware and fake login pages.
The malware was delivered from a compromised government website Malware was hidden in a decoy PDF file, payloads inside fake JPG files Google has informed affected organisations and shared samples of ...