The British intelligence agency used a sophisticated exploitation tool, called "Quantum Insert," to trick telecom workers, a German newspaper revealed.
In recent weeks, a new variant of Sazoora malware has struck around 23,000 machines, with more than 1,800 infections occurring in the U.S.
In a white paper on its security approach, Huawei said that it has never been asked by any government to provide customer data or access to its technology.
Kevin Mandia, CEO of Mandiant, told a foreign policy outlet that a hacking group in China sent him phishing emails.
At least three major media sites in Japan were infected, so that visitors' running vulnerable versions of IE would be exploited, FireEye researchers found.
Researchers at Symantec linked the group's activities to attacks on Google and Bit9.
The country is investigating how Belgacom's networks were hacked, but has yet to confirm the believed culprit.
A security firm polled nearly 200 senior security professionals at the Black Hat conference in Las Vegas to get their perspective on advanced attacks.
APT12, the espionage group believed to be behind attacks on The New York Times, is piggy-backing on international interest in the G20 summit to penetrate victims' networks via malicious emails.
Along with a report on the latest Poison Ivy-related APT threats, FireEye also released a free package of tools to help organizations identify targeted attacks where the remote access trojan is leveraged.
According to FireEye, China-based espionage group "APT12" has infiltrated the networks of several organizations, as recently as June, with new malware variants that are difficult to detect.
Sens. Sheldon Whitehouse, D-R.I., and Lindsey Graham, R-S.C., have drafted a bill to amend the Economic Espionage Act.
According to a Citizen Lab report, security firm Blue Coat also may have violated U.S. sanctions that bar the sale of technologies to countries with a history of human rights grievances, such as Iran, Syria and Sudan.
Malware has been searching for documents containing key military terms in South Korean networks since 2009, and the Dark Seoul incident perpetrators are likely responsible.
Attackers are using malware, called "njRAT," to hijack victims' computers and spread to others in the organization.
The group has targeted corporations in South Korea, and some in the U.S., since 2009, according to Symantec researchers.
According to the 9b+ security research blog, the email targeted a member of the Tibetan Youth Congress in India.
A group delivering a malicious toolkit, called NetTraveler, has used two commonly exploited vulnerabilities in Microsoft Word to steal data from more than 300 victims.
Every Friday, after the SC Magazine news team has taken a few spins around the interwebs, we post some security-related links that we found interesting. We hope you do too.
The 100-page report mostly addresses alleged Chinese cyber espionage operations, and suggests it's time for U.S. government agencies and corporations to consider more proactive approaches, possibly including hack-backs.
Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities, according to a report.
Researchers at security firm Norman on Monday, building on earlier analysis from ESET, publicized a new attack infrastructure that is conducting national security and industrial espionage on targets across the world.
The proposal from two Republican and two Democratic senators requires the director of national intelligence to create a "watch list" of nations suspected of cyber spying.
As nations engage with one another in shadowy conflicts taking place in the digital sphere, experts are questioning whether treaties and rules that were created for kinetic fighting apply to a new era of combat.
The Travnet botnet uploads Microsoft Office files, PDFs and text files to remote servers run by attackers.
Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?
China and the United States plan to erect a cyber security working group in light of continued worries over the former's alleged cyber espionage activities, according to reports.
Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.
The rule, part of a general appropriations bill signed by President Obama last week, comes following growing evidence of China's organized cyber espionage operations.
Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.