A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.
Sentinel Labs dubbed the repurposed malware "Gyges."
TrapX was alerted to the zero-day attack when the malware targeted servers with "finance" in their host names.
Chinese hackers broke into databases at the Office of Personnel Management which house data on workers applying for top-secret security clearance.
A variant of espionage malware that plagued government entities and other organizations across the globe has returned with a new toolset and a different set of victims.
CrowdStrike revealed that the attack group is now targeting sensitive data about political affairs in Iraq.
Symantec's report on the "Dragonfly" group brings additional insight on attackers spreading Havex malware.
F-Secure detected 88 variants of the malware, which infected companies in Europe, as well as a California firm.
HackingTeam is an Italian seller of hacking software marketed to police and governments.
CrowdStrike revealed that the spy network "Putter Panda" appears to share resources with the infamous espionage group APT1.
A report from the Center for Strategic and International Studies puts a dollar figure on cybercrime costs but shows wider economic fallout.
iSight Partners detailed the elaborate social engineering scheme used to target senior military and government officials in the U.S.
The government may impose visa restrictions on Chinese nationals who are scheduled to attend the upcoming Black Hat and DefCon security conferences.
Five members of the People's Liberation Army were indicted for stealing trade secrets from several large U.S. companies including Alcoa.
According to Trend Micro, the public sector has remained a top target of cybercrime.
Attacks by the Ajax Security Team, and other Iranian groups, have grown in sophistication from website defacement to politically motivated cyber espionage.
Espionage has been a fact of life for centuries, but with increased capabilities online, it's spread beyond a narrow core, reports James Hale.
While China continued to lead cyber espionage activity against organizations, Eastern Europe accounted for more than 20 percent of related incidents, according to an annual data breach report.
Recent Snowden leaks allege that the NSA targeted Chinese telecom firm Huawei for corporate data, including product source code.
On Wednesday, FireEye revealed research linking the Chinese-based attack group APT1 to those behind the Siesta campaign.
Proprietary information, including technical data, from Japanese companies was allegedly leaked to rivals.
Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.
A police department used a "stingray" cell phone tracking device without a judge-issued warrant to pinpoint a suspected criminal's location.
Researchers at FireEye found that the U.S. Veterans of Foreign Wars site was booby trapped to spread a backdoor.
A division of the British spy agency deployed a distributed denial-of-service (DDoS) attack to uncover identities of Anonymous members.
Researchers have revealed that Russia is behind hundreds cyber espionage campaigns targeting American, European and Asian companies.
Chinese hackers spied on five European ministries' computers by way of a phishing attack at September's G20 Summit, according to new research.
The British intelligence agency used a sophisticated exploitation tool, called "Quantum Insert," to trick telecom workers, a German newspaper revealed.
In recent weeks, a new variant of Sazoora malware has struck around 23,000 machines, with more than 1,800 infections occurring in the U.S.
In a white paper on its security approach, Huawei said that it has never been asked by any government to provide customer data or access to its technology.