Anthropic Claude AI Used by Chinese-Back Hackers in Spy Campaign
A Chinese nation-state threat group abused Anthropic’s Claude AI model in a series of cyberespionage attacks that the AI...
A Chinese nation-state threat group abused Anthropic’s Claude AI model in a series of cyberespionage attacks that the AI...
Oct 31, 2025Ravie LakshmananMalware / Browser Security A suspected nation-state threat actor has been linked to the distribution of a...
Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage The Iranian nation-state group known as MuddyWater has been attributed to a new...
Partnering with an EDR vendor after a nation-state has already stolen your source code isn’t innovation — it’s a gamble....
A sophisticated nation-state actor breached F5 systems, stealing BIG-IP source code and data on undisclosed flaw Pierluigi Paganini October 15,...
On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5 systems and...
Nation-State hackers exploit Libraesva Email Gateway flaw Pierluigi Paganini September 24, 2025 State-sponsored hackers exploited a vulnerability, tracked as CVE-2025-59689,...
The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of a cyber espionage...
Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure environment by exploiting...
Be it intricate state-sponsored offensives or concealed malware hiding in unconventional domains, the current cybersecurity domain serves as a testimony...
An affiliated threat entity connected to North Korea has been identified in an active operation aimed at South Korean enterprises,...
Recent discoveries from the Security Intelligence Center at AhnLab have revealed that the hacking collective Kimsuky has been engaged in...
Charming Kitten, the nation-state hacking group from Iran, has been detected utilizing a C++ iteration of the popular BellaCiao malware....
The Russian state-sponsored group known as Hidden Snowstorm has been spotted utilizing malicious software linked with other cybercriminals to distribute...
When it comes to cybersecurity, Sophos hasn't been the initial vendor to witness its boundary products being aimed at by...