The hosting provider's compromise allowed attackers to deliver malware through tainted software updates for six months.
Regional APT Threat Situation In December 2025, the global threat hunting system of Fuying Lab detected a total of 24 APT attack activities. These activities were primarily concentrated in regions ...
Sandworm (aka UAC-0113, APT44, and Seashell Blizzard) is thought to be part of the Russian military intelligence service ...
Russian state-sponsored APT Sandworm deployed data-wiping malware in a December 2025 cyberattack against Poland’s power grid.
Attacks linked to APT and ransomware groups are relying on DLL sideloading for code execution instead of exploit-based initial access.
APT28 exploited a Microsoft Office flaw to deliver MiniDoor and Covenant Grunt malware in targeted attacks across Ukraine and Eastern Europe.
ESET has released its latest advanced persistent threat (APT) report, covering the period from April through September 2025. China-aligned APT groups continued to advance Beijing’s geopolitical ...
Yesterday, the ESET research team released the latest issue of its APT Activity Report that summarizes and contextualizes the cyber-operations of some of the world's most notorious state-aligned ...
IntroductionIn September 2025, Zscaler ThreatLabz identified two campaigns, tracked as Gopher Strike and Sheet Attack, by a threat actor that operates in Pakistan and primarily targets entities in the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results