Recent Snowden leaks allege that the NSA targeted Chinese telecom firm Huawei for corporate data, including product source code.
On Wednesday, FireEye revealed research linking the Chinese-based attack group APT1 to those behind the Siesta campaign.
Proprietary information, including technical data, from Japanese companies was allegedly leaked to rivals.
Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.
A police department used a "stingray" cell phone tracking device without a judge-issued warrant to pinpoint a suspected criminal's location.
Researchers at FireEye found that the U.S. Veterans of Foreign Wars site was booby trapped to spread a backdoor.
A division of the British spy agency deployed a distributed denial-of-service (DDoS) attack to uncover identities of Anonymous members.
Researchers have revealed that Russia is behind hundreds cyber espionage campaigns targeting American, European and Asian companies.
Chinese hackers spied on five European ministries' computers by way of a phishing attack at September's G20 Summit, according to new research.
The British intelligence agency used a sophisticated exploitation tool, called "Quantum Insert," to trick telecom workers, a German newspaper revealed.
In recent weeks, a new variant of Sazoora malware has struck around 23,000 machines, with more than 1,800 infections occurring in the U.S.
In a white paper on its security approach, Huawei said that it has never been asked by any government to provide customer data or access to its technology.
Kevin Mandia, CEO of Mandiant, told a foreign policy outlet that a hacking group in China sent him phishing emails.
At least three major media sites in Japan were infected, so that visitors' running vulnerable versions of IE would be exploited, FireEye researchers found.
Researchers at Symantec linked the group's activities to attacks on Google and Bit9.
The country is investigating how Belgacom's networks were hacked, but has yet to confirm the believed culprit.
A security firm polled nearly 200 senior security professionals at the Black Hat conference in Las Vegas to get their perspective on advanced attacks.
APT12, the espionage group believed to be behind attacks on The New York Times, is piggy-backing on international interest in the G20 summit to penetrate victims' networks via malicious emails.
Along with a report on the latest Poison Ivy-related APT threats, FireEye also released a free package of tools to help organizations identify targeted attacks where the remote access trojan is leveraged.
According to FireEye, China-based espionage group "APT12" has infiltrated the networks of several organizations, as recently as June, with new malware variants that are difficult to detect.
Sens. Sheldon Whitehouse, D-R.I., and Lindsey Graham, R-S.C., have drafted a bill to amend the Economic Espionage Act.
According to a Citizen Lab report, security firm Blue Coat also may have violated U.S. sanctions that bar the sale of technologies to countries with a history of human rights grievances, such as Iran, Syria and Sudan.
Malware has been searching for documents containing key military terms in South Korean networks since 2009, and the Dark Seoul incident perpetrators are likely responsible.
Attackers are using malware, called "njRAT," to hijack victims' computers and spread to others in the organization.
The group has targeted corporations in South Korea, and some in the U.S., since 2009, according to Symantec researchers.
According to the 9b+ security research blog, the email targeted a member of the Tibetan Youth Congress in India.
A group delivering a malicious toolkit, called NetTraveler, has used two commonly exploited vulnerabilities in Microsoft Word to steal data from more than 300 victims.
Every Friday, after the SC Magazine news team has taken a few spins around the interwebs, we post some security-related links that we found interesting. We hope you do too.
The 100-page report mostly addresses alleged Chinese cyber espionage operations, and suggests it's time for U.S. government agencies and corporations to consider more proactive approaches, possibly including hack-backs.
Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities, according to a report.