Amaranth-Dragon, an advanced threat group linked to APT-41, unleashed a rapid cyber-espionage campaign against Southeast Asian governments by exploiting a newly disclosed WinRAR vulnerability. Their blend of technical sophistication and geopolitical timing sets a new standard for stealthy attacks.
Russian-state hackers exploited a critical Microsoft Office vulnerability just hours after an emergency patch, targeting diplomats, defense, and transport organizations in a rapid, stealthy campaign. Learn the details behind this high-speed cyber-espionage operation.
Chinese threat actors, including the newly identified Amaranth-Dragon group, are exploiting fresh WinRAR vulnerabilities and trusted cloud platforms to infiltrate Southeast Asian governments, marking a new era of stealthy, targeted cyber espionage.
Mustang Panda, a China-backed hacking group, targeted government officials with fake diplomatic briefings, using stealthy malware and social engineering to gather sensitive data in a recent espionage campaign.
HoneyMyte, also known as Mustang Panda, has unleashed a wave of advanced cyber-espionage tools in 2025. Their upgraded CoolClient malware now features clipboard monitoring, proxy credential theft, and modular plugins, targeting governments and enterprises across Asia and Europe.
Within days of Microsoft disclosing a critical Office vulnerability, Russian APT28 hackers launched a rapid, covert campaign targeting European governments with stealthy malware. Here’s how the attack unfolded—and what it means for cyber defense.
#Microsoft Office | #Zero-Day Vulnerability | #Cyber Espionage
Mustang Panda, a notorious China-linked hacking group, has unleashed a stealthier version of its COOLCLIENT backdoor, targeting government networks in Asia and Russia. Their evolving tactics now include advanced surveillance, credential theft, and collaborations with other threat clusters.
A critical WinRAR vulnerability has been weaponized by both state-backed hackers and cybercriminals, enabling global espionage and cybercrime through malicious archive files. Learn how attackers gained persistence and what this means for cybersecurity.
A critical WinRAR vulnerability, CVE-2025-8088, is being exploited by state-backed hackers and cybercriminals to gain persistent access to Windows systems. Despite an available patch, the flaw remains a favorite tool for espionage and financial crime campaigns.
Two newly discovered cyber campaigns, Gopher Strike and Sheet Attack, are targeting Indian government agencies with advanced tactics and custom malware, signaling the emergence of new Pakistan-linked threat actors.
#Cyber espionage | #Indian government | #Pakistan-linked hackers