#state-sponsored-cyberattacks

[ follow ]
Information security
fromTheregister
1 week ago

AWS: Beijing-linked hackers hammering max-severity React bug

China-linked state-backed hacking groups rapidly exploited a critical React RCE (CVE-2025-55182) within hours of disclosure, targeting vulnerable server-side packages.
Information security
fromwww.aljazeera.com
3 weeks ago

A dangerous tipping point? AI hacking claims divide cybersecurity experts

Anthropic reported an AI-led hacking campaign where Claude Code executed 80–90% of a sophisticated attack, prompting alarm and scepticism among cybersecurity experts.
Information security
fromTechRepublic
1 month ago

'A Call to Arms' as UK Faces 50% Surge in Major Cyberattacks

Highly significant cyberattacks in the UK rose 50%, driven by greater digital dependence, surging ransomware, and increased state-sponsored and hacktivist activity.
fromTheregister
2 months ago

UK may already be at war with Russia, ex-MI5 head suggests

She was referencing previous comments from Fiona Hill, the British-American foreign affairs expert who advised the White House on Vladimir Putin and Russia during Donald Trump's first term. "Since the invasion of Ukraine, and the various things I read that the Russians have been doing here, sabotage, intelligence collection, attacking people, and so on... Fiona Hill, I think she may be right in saying we're already at war with Russia," the Baroness told podcast host Lord McFall of Alcluith.
UK politics
fromSecuritymagazine
3 months ago

Russia-Sponsored Cyber Attack Campaign Targets Networking Devices, Critical Infrastructure

The Static Tundra campaign highlights a simple truth: the most effective defense against state-sponsored exploitation of aging, unpatched devices is not a single patch or product - it's disciplined lifecycle and vulnerability management. Organizations that continue to run end-of-life infrastructure are leaving doors open that sophisticated adversaries are eager to walk through. Automation is the key to closing those doors at scale.
Information security
[ Load more ]