cybersecurity

5299 readers
9 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
26
 
 

🎁 Here’s a little end-of-year gift backed with Sightings from Vulnerability-Lookup ! A small step into 2026.

The year is almost over, so we’ve wrapped up a fresh Sightings Forecast — looking at how sightings evolve across social platforms, code repositories, and structured feeds. All monitored through our tools[1] and enriched by our fantastic community[2].

👉 Read the full report:

https://www.vulnerability-lookup.org/2025/12/02/end-of-year-threat-intelligence-sightings-forecast/

The goal: track how sightings evolve over time and provide an adaptive short-term forecast for several key sources monitored by Vulnerability-Lookup.

Our methodology combines weekly historical trends with daily adaptive models. Depending on the underlying slope, we apply either a Logistic Growth model (for rising trends) or an Exponential Decay model (for declining activity).

🔍 Key takeaways

Social platforms like the Fediverse and Bluesky show highly event-driven, volatile patterns, reflecting real-time community discussions.

Structured sources such as MISP Projec, The Shadowserver Foundation, and Nuclei offer more stable and reliable signals, ideal for validated intelligence.

Early detection: Social sources provide fast but noisy signals. Not to ignore.

Reliability: Structured intelligence confirms and contextualizes threats.

Better planning: Adaptive forecasting enables informed prioritization and workload management.

Balanced visibility: Combining heterogeneous sources gives stronger situational awareness.

📚 References

💶🇪🇺 Funding

This work is part of the EU-funded FETTA initiative, strengthening cross-European collaboration on threat intelligence.

https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/how-to-participate/org-details/999999999/project/101128030/program/43152860/details

27
 
 

cross-posted from: https://mander.xyz/post/42887934

Web archive link

The accelerating cyber threats facing Ireland demands “an aggressive response” by the State, according to the country’s cyber bosses.

The National Cyber Security Centre (NCSC) said criminal cyber gangs and hackers, aligned to states like China and Russia, pose a “significant threat” to Ireland’s national security.

This is because Ireland is a host to some of the world’s largest tech providers and cloud computing facilities as well as the worsening geopolitical situation and the threat posed to Europe resulting from Russia’s war of aggression in Ukraine.

The centre said it “regularly observes state-aligned threat actors carrying out scanning and other reconnaissance activities” targeting Irish government and State-owned networks.

...

Publishing its 2025 National Cyber Risk Assessment, the NCSC said Ireland was at risk from cyber attacks on “shared critical infrastructure”, such as gas and electricity pipelines connecting Ireland to the UK and France.

...

28
 
 

cross-posted from: https://mander.xyz/post/42887732

Web archive link

Belgium has joined a growing list of countries banning Chinese generative AI tool DeepSeek from devices used by government officials and public servants after a cybersecurity agency raised concerns.

Federal public administration employees had until Monday to uninstall DeepSeek’s apps from all work devices, according to a note circulated by the ministry and reported in local media.

The minister for public action and modernisation, Vanessa Matz, announced the plan in September after receiving the results of an analysis by the Centre for Cybersecurity Belgium of the use of AI tools in the administration. The ban is preventive, according to the minister.

“Trust in the government rests on fundamental principles of prevention, protection of citizens’ personal data, and cybersecurity,” Matz said in a statement. “By banning the use of this system, we are demonstrating vigilance to ensure that our government departments remain a safe, secure, and exemplary environment.”

The government added that “risks to the protection of data transmitted to the DeepSeek AI tool” merit the precautionary ban, per a press release.

Other countries in Europe have taken similar steps: Czechia and the Netherlands barred the use of DeepSeek by government employees on work devices in July and February respectively. Italy, Australia, Taiwan, and South Korea have also announced measures to protect their citizens’ privacy and security.

...

29
30
 
 

I wanted to investigate about onion routing when using WebRTC.

Im using PeerJS in my app. It allows peers to use any crypto-random string to connect to the peerjs-server (the connection broker). To improve NAT traversal, im using metered.ca TURN servers, which also helps to reduce IP leaking, you can use your own api key which can enable a relay-mode for a fully proxied connection.

For onion routing, i guess i need more nodes, which is tricky given in a p2p connection, messages cant be sent when the peer is offline.

I came across Trystero and it supports multiple strategies. In particular i see the default strategy is Nostr... This could be better for secure signalling, but in the end, the webrtc connection is working correctly by aiming for fewer nodes between peers - so that isnt onion routing.

SimpleX-chat seems to have something it calls 2-hop-onion-message-routing. This seems to rely on some managed SMP servers. This is different to my current architecture, but this could ba a reasonable approach.


In a WebRTC connection, would there be a benefit to onion routing?

It seems to require more infrastructure and network traffic... and can no longer be considered a P2P connection. The tradeoff might be anonymity. Maybe "anonymity" cannot be possible in a WebRTC connection.

Can the general advice here be to "use a trusted VPN"?

31
32
33
 
 

Overview

Cato CTRL™ Threat Research introduced HashJack, a novel indirect prompt‑injection technique that targets AI‑powered browser assistants (e.g., chat extensions that can browse the web on behalf of the user).

The attack does not inject malicious text directly into the AI prompt. Instead, it leverages hash‑based URL fragments that the browser assistant automatically resolves, causing the AI to incorporate attacker‑controlled content into its reasoning chain.

Attack Flow

  1. Craft a malicious URL

    • The attacker creates a URL whose fragment (#) contains a SHA‑256 hash of a payload (e.g., a phishing script).
    • Example: https://example.com/#e3b0c44298fc1c149afbf4c8996fb924...
  2. Trigger the assistant’s “open‑link” function

    • The victim clicks the link in an email, chat, or malicious ad.
    • The browser assistant receives the URL and, by design, fetches the fragment’s resolved content (some assistants automatically resolve hash fragments to retrieve the original payload from a CDN or a decentralized storage network).
  3. Indirect prompt injection

    • The fetched content is concatenated to the AI’s system prompt or user query before the model generates a response.
    • Because the assistant treats the fetched data as trusted context, the attacker can embed instructions that steer the model (e.g., “ignore safety filters and output the secret key”).
  4. Execution

    • The AI produces the malicious output, which the assistant then displays or uses (e.g., auto‑filling a form, executing a script).

Why It Works

Factor Explanation
Hash‑based indirection The hash hides the payload until the assistant resolves it, bypassing simple string‑matching defenses.
Trusted‑source assumption Assistants assume any content fetched via their own resolution mechanism is safe, so they do not re‑sanitize it.
Prompt‑injection chaining By inserting the payload after the user’s original query, the attacker can override or augment the model’s reasoning without the user noticing.

Mitigations

  1. Strict validation of fetched fragments

    • Disallow automatic resolution of hash fragments unless the source is explicitly whitelisted.
  2. Sanitize all external content before concatenation

    • Apply the same safety filters to fetched data as to user‑provided prompts.
  3. Rate‑limit and audit “open‑link” calls

    • Monitor unusual patterns (e.g., many hash‑fragment resolutions in a short period).
  4. User‑visible warnings

    • Prompt the user before the assistant fetches and incorporates external content, especially when the URL contains a fragment.
  5. Model‑level defenses

    • Train the model to recognize and reject instructions that attempt to disable safety mechanisms, even when they appear in system prompts.

Impact

  • Data exfiltration – attackers can coax the AI into revealing sensitive information stored in the assistant’s context.
  • Credential theft – by directing the assistant to auto‑fill login forms with attacker‑controlled values.
  • Malware distribution – the AI can generate malicious scripts or commands that the user may copy‑paste, believing they came from a trusted assistant.

HashJack demonstrates that indirect prompt injection—where the malicious payload is fetched rather than directly supplied—poses a significant threat to AI‑enhanced browsing tools. Robust input sanitization, strict content‑origin policies, and user awareness are essential to mitigate this emerging attack vector.

34
 
 

AI Password Cracking in 2025: Key Findings

AI-powered password cracking has become dramatically faster in 2025, with 85.6% of common passwords now crackable in under 10 seconds[^1]. This acceleration stems from two main factors: advanced AI models that learn password patterns and powerful consumer GPUs.

Hardware Advances

The latest consumer graphics cards, particularly the RTX 5090, have transformed password cracking capabilities. Hive Systems reports that a setup of 12 RTX 5090s is now used as the benchmark for modern password cracking attempts[^2].

Time to Crack by Password Type

For bcrypt-hashed passwords (work factor 10):

  • 8 characters or less: Instant crack regardless of complexity
  • 10 characters with mixed characters: 27 years
  • 12 characters with mixed characters: 244,000 years
  • 16 characters with mixed characters: 19 trillion years[^2]

AI's Impact

AI tools like PassGAN have revolutionized cracking by:

  • Learning common password patterns
  • Recognizing user habits like capitalizing first letters
  • Predicting likely passwords instead of random guessing[^1]

Security Recommendations

Recent findings emphasize:

  • Length over complexity (minimum 16 characters)
  • Use of password managers
  • Implementation of Multi-Factor Authentication (MFA)
  • Adoption of passkeys where available[^3]

[^1]: Messente - How Quickly Can AI Crack Your Password? [^2]: Hive Systems - Are Your Passwords in the Green? [^3]: Forbes - AI Can Crack Your Passwords Fast—6 Tips To Stay Secure

35
 
 

A sophisticated phishing campaign is currently leveraging a subtle typographical trick to bypass user vigilance, deceiving victims into handing over sensitive login credentials. Attackers utilize the domain “rnicrosoft.com” to impersonate the tech giant.

By replacing the letter ‘m’ with the combination of ‘r’ and ‘n’, fraudsters create a visual doppleganger that is nearly indistinguishable from the legitimate domain at a casual glance.

This technique, known as typosquatting, relies heavily on the font rendering used in modern email clients and web browsers.

36
 
 

A series of "trivial-to-exploit" vulnerabilities in Fluent Bit, an open source log collection tool that runs in every major cloud and AI lab, was left open for years, giving attackers an exploit chain to completely disrupt cloud services and alter data.

The Oligo Security research team found the five vulnerabilities and - in coordination with the project's maintainers - on Monday published details about the bugs that allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags.

37
38
39
40
 
 

A good overview of their tests and findings surrounding Flock cameras. Goes through some approaches on manipulating and monitoring the cameras themselves, but also the hosted Flock platform, police, shared data, and politics.

41
 
 

A new open-source tool called SilentButDeadly has emerged, designed to disrupt Endpoint Detection and Response (EDR) and antivirus (AV) software by severing their network communications.

Developed by security researcher Ryan Framiñán, the tool leverages the Windows Filtering Platform (WFP) to create temporary, bidirectional blocks on EDR cloud connectivity, isolating threats without terminating processes.

His approach builds on the 2023 EDRSilencer technique, offering improved operational safety through dynamic, self-cleaning filters.

42
 
 

cross-posted from: https://mander.xyz/post/41894619

Archived link

Wherever possible, only components from our own production – this is the federal government's plan for German telecommunications networks, which Chancellor Friedrich Merz surprisingly announced on Thursday at the congress of the German Retail Association in Berlin.

"We have decided within the government that we will replace components wherever possible – for example in the 5G network – with components that we produce ourselves," according to consistent media reports citing Merz, including the Handelsblatt. "And we will not allow components from China in the 6G network." Merz did not provide a more precise classification, for example, what is considered "self-produced" according to this standard. The statement is said to have been made during a Q&A session and is not to be found in the transcript of his speech.

...

The industry should discuss what can be done not only to become more independent from China, but also from the USA and the major technology companies, Merz is further quoted as saying. However, Merz ruled out a complete decoupling from China.

...

Just at the beginning of the month, the Federal Network Agency tightened its rules for components of the 5G network. The regulator argues that 5G networks represent the future backbone of digitized economies, connect billions of systems, and process sensitive information in critical infrastructures (Kritis). According to the Handelsblatt, the CDU, CSU, and SPD last week also agreed on new legislation also agreed on new legislative tightening last week to ban equipment from German telecommunications networks deemed insecure.

...

According to the legally anchored "Huawei Clause", the federal government can prohibit the use of "critical components" in cases of "potential threats to public safety and order." The federal government and the mobile network operators reached a fundamental agreement last year to no longer use technology from Huawei or ZTE for critical components of the radio networks by 2029.

43
 
 

We’re delighted to announce the release of Vulnerability-Lookup 2.18.0 — packed with exciting new features!

What's New

Integration with Rulezet

Rulezet is an open-source platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suricata, etc.). Its goal is to foster collaboration among professionals and enthusiasts to enhance the quality and reliability of detection rules.

Vulnerability-Lookup can now be configured to interface with the API of any Rulezet instance, providing insights into existing detection rules related to security vulnerabilities.
The default Rulezet instance enabled in Vulnerability-Lookup is hosted at https://rulezet.org/ and currently offers more than 122,000 security rules.

Detection rules related to vulnerabilities are displayed on the vulnerability details page (in a dedicated tab) and on bundle details pages.

You can even query the remote Rulezet instance via the Vulnerability-Lookup API:

$ curl --silent 'https://vulnerability.circl.lu/api/rulezet/search_rules_by_vulnerabilities/CVE-2020-27130?page=1&per_page=50' | jq
{
  "metadata": {
    "count": 3,
    "page": 1,
    "per_page": 50
  },
  "data": [
    {
      "id": 122599,
      "uuid": "84846673-015e-450b-8a73-2ba481b5a6ce",
      "vulnerability_id": "CVE-2020-27130",
      "format": "suricata",
      "title": "Exploit CVE-2020-27130 on Cisco Security Manager - Upload webshell",
      "description": "Rule for security (detection rule in many format)",
      "raw": "alert http any any -> any any (msg:\"Exploit CVE-2020-27130 on  Cisco Security Manager - Upload webshell\"; flow:to_server,established; content:\"POST\"; http_method; content:\"/cwhp/XmpFileUploadServlet\"; startswith; http_uri; pcre:\"/filename=\\\".*\\.\\.\\/.+\\\"\\r\\n/P\"; reference:cve,CVE-2020-27130; classtype:web-application-attack; sid:2020271303; rev:1;)",
      "detail_url": "https://rulezet.org/rule/detail_rule/122599",
      "creation_date": "2025-11-06 13:03",
      "updated_date": "2025-11-13 09:33"
    },
    {
      "id": 122598,
      "uuid": "538dafc1-d49c-4fd6-bdb5-57b997346fe6",
      "vulnerability_id": "CVE-2020-27130",
      "format": "suricata",
      "title": "Exploit CVE-2020-27130 on Cisco Security Manager - Download arbitrary directory as a zip file",
      "description": "Rule for security (detection rule in many format)",
      "raw": "alert http any any -> any any (msg:\"Exploit CVE-2020-27130 on Cisco Security Manager - Download arbitrary directory as a zip file\"; flow:to_server,established; content:\"GET\"; http_method; pcre:\"/^\\/cwhp\\/(Xmp|Sample)FileDownloadServlet/U\"; content:\"../\"; distance:0; http_uri; reference:cve,CVE-2020-27130; classtype:web-application-attack; sid:2020271302; rev:1;)",
      "detail_url": "https://rulezet.org/rule/detail_rule/122598",
      "creation_date": "2025-11-06 13:03",
      "updated_date": "2025-11-06 13:03"
    },
    {
      "id": 122597,
      "uuid": "2cd8fb2a-e97b-4390-8dca-d416b2858c66",
      "vulnerability_id": "CVE-2020-27130",
      "format": "suricata",
      "title": "Exploit CVE-2020-27130 on Cisco Security Manager - Download arbitrary file",
      "description": "Rule for security (detection rule in many format)",
      "raw": "alert http any any -> any any (msg:\"Exploit CVE-2020-27130 on Cisco Security Manager - Download arbitrary file\"; flow:to_server,established; content:\"GET\"; http_method; pcre:\"/^\\/athena\\/(xdmProxy\\/(xdmConfig|xdmResources)|itf\\/resultsFrame\\.jsp)/U\"; content:\"../\"; distance:0; http_uri; reference:cve,CVE-2020-27130; classtype:web-application-attack; sid:2020271301; rev:1;)",
      "detail_url": "https://rulezet.org/rule/detail_rule/122597",
      "creation_date": "2025-11-06 13:03",
      "updated_date": "2025-11-06 13:03"
    }
  ]
}

Thanks to Théo Geffe for making this integration possible.

Indexing Information Related to Assigners (CNA)

Information about security advisory assigners is now indexed. CNAs from the official CVE Program source (cvelistv5) are indexed in Kvrocks, with GNAs planned for the future.
The API exposes this data via a new assigners endpoint. From an API perspective, both CNAs and GNAs are treated as assigners, though they will be stored in dedicated indexes.

Updates include:

  • Enhanced search capabilities related to assigners.
  • Improved /stats page.
  • Updated vulnerability details page: display the assigner name with a link.
  • A new page listing assigners, similar to the existing CWE list.

Implemented in PR #283.

Website

  • new: [website] Add PROTECT_USER_PAGES option to restrict user profile pages to authenticated users. Closes (#277)

Vulnerability Sources

Changes

  • chg: [website] Account creation via the API is now rate-limited to 3 registrations per hour per IP. (3a12de2)
  • Additional validation checks have been added to reject email addresses that are disposable (MISP list), from blocked domains, or with invalid MX records. (3a12de2)
  • chg: [website] Improved email address check in both the API endpoint and in the form controller. (bb090fc)
  • chg: [website] user.last_seen is now updated after successful login. (fb5796e)
  • chg: [API] Improved date parsing for sightings (d7bc9fd)
  • chg: [website] Harmonization of the templates for the details views of bundles and comments. (c7f90aa)
  • chg: [feeders] Improved use of the kvrocks counters for vendors and cwe rankings. (1205670)
  • chg: [notifications] add random jitter to reschedule execution times (d974315)
  • various minor improvements to the backend, user interface and documentation.

Refreshed views

Fixes

  • fix: [website] Redirect the user to the user_bp.watchlist view if notifications are found. (4f6e0bc)
  • fix: [API] Delete notifications of the user to delete. (2371962)
  • Rename flatpickr to flatpickr.js and update template reference (8dcc804) by @DocArmoryTech

Changelog

📂 For the full list of changes, check the GitHub release:
https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v2.18.0

Thank you to all contributors and testers!

Feedback and Support

If you find any issues or have suggestions, please open a ticket on our GitHub repository:
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/
We appreciate your feedback!

Follow Us on Fediverse/Mastodon

Stay updated on security advisories in real-time by following us on Mastodon:
https://social.circl.lu/@vulnerability_lookup/

44
 
 

lightdm-kde-greeter is a KDE-themed greeter application for the lightdm display manager. At the beginning of September one of our community packagers asked us to review a D-Bus service contained in lightdm-kde-greeter for addition to openSUSE Tumbleweed.

In the course of the review we found a potential privilege escalation from the lightdm service user to root which is facilitated by this D-Bus service, among some other shortcomings in its implementation.

45
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

46
 
 

cross-posted from: https://scribe.disroot.org/post/5554392

Archived version

  • The European Commission is exploring ways to force European Union member states to phase out Huawei Technologies Co. and ZTE Corp. from their telecommunications networks.
  • Commission Vice President Henna Virkkunen wants to convert the European Commission’s 2020 recommendation to stop using high-risk vendors in mobile networks into a legal requirement.
  • The EU is increasingly focused on the risks posed by Chinese telecom equipment makers as trade and political ties with its second-largest trading partner fray.

The European Commission is exploring ways to force European Union member states to phase out Huawei Technologies Co. and ZTE Corp. from their telecommunications networks, according to people familiar with the matter.

Commission Vice President Henna Virkkunen wants to convert the European Commission’s 2020 recommendation to stop using high-risk vendors in mobile networks into a legal requirement, according to the people, who asked not to be identified because the negotiations are private.

While infrastructure decisions rest with national governments, Virkkunen’s proposal would compel EU countries to align with the commission’s security guidance. If the recommendations become legally binding, member countries that don’t follow the rules could face a so-called infringement procedure and financial penalties.

The EU is increasingly focused on the risks posed by Chinese telecom equipment makers as trade and political ties with its second-largest trading partner fray. The concern is that handing over control of critical national infrastructure to companies with such close ties to Beijing could compromise national security interests.

...

47
 
 

cross-posted from: https://lemmy.kde.social/post/4937011

Archived link

A new report from ENISA (European Union Agency for Cybersecurity) warns that public administrations across the EU are facing a surge in cyberattacks, with hacktivists increasingly relying on distributed denial-of-service (DDoS) campaigns. Central governments were the most targeted, accounting for 69% of incidents. The majority of incidents targeted the websites of parliaments, ministries, and national authorities/agencies, largely skewed by DDoS attacks.

As these institutions handle vast amounts of sensitive data and provide essential public services amid growing digitization, even a single incident can cause major disruption and erode public trust. The 42-page report identifies DDoS attacks, data breaches, ransomware, and social engineering as the most prevalent threats. ENISA’s latest sectoral analysis offers a comprehensive view of these risks, aiming to inform better risk assessments, strengthen mitigation strategies, and guide policymaking across the public sector.

...

ENISA expects several trends to shape the cyber threat landscape for the EU’s public administration sector in 2025. DDoS campaigns are likely to continue, particularly around major events such as elections and international summits, though they may not cause significant operational disruptions. State-linked activity is also expected to persist, with Russia- and China-aligned intrusion groups maintaining cyber espionage campaigns aimed at collecting strategic data from EU institutions.

The use of artificial intelligence in social engineering is projected to grow, with generative language models, voice-cloning, and face-swap tools increasingly leveraged for phishing, vishing, and misinformation campaigns. These operations may move beyond simple extortion to focus on manipulating public opinion and eroding trust. Opportunistic ransomware attacks are also anticipated to continue, causing occasional but notable service disruptions across the public sector.

...

The report also identified state-nexus intrusion sets publicly documented as associated with Russia and China that were active in cyberespionage campaigns against the public administration in the EU, notably targeting governmental entities.

...

Addition:

China-linked hacker group UNC6384 (also known as Mustang Panda) attacks European diplomatic agencies in Hungary, Belgium, Italy, the Netherlands, and Serbia between September and October 2025.

48
 
 

binfmt_misc (short for Binary Format Miscellaneous) is a Linux kernel feature that allows the system to recognize and execute files based on custom binary formats. It’s part of the Binary Format (binfmt) subsystem, which determines how the kernel runs an executable file.

In 2019, SentinelOne published a two-part analysis describing a persistence technique called Shadow SUID (Part 1, Part 2): Shadow SUID is the same as a regular suid file, only it doesn’t have the setuid bit, which makes it very hard to find or notice. The way shadow SUID works is by inheriting the setuid bit from an existing setuid binary using the binfmt_misc mechanism, which is part of the Linux kernel.

Interestingly, this technique seems to have fallen into oblivion again, as neither MITRE ATT&CK nor the five-part Elastic Security “Linux Persistence Detection Engineering” series mentioned it (the last part here with links to all other parts). As of 2025, however, the technique works wonderfully and would probably be very difficult to detect (see the hunting section later).

49
 
 

Internal documents reveal Meta projected it would earn $16 billion - about 10% of its 2024 revenue - from running ads for scams and banned goods[1]. The company shows users an estimated 15 billion "higher risk" scam advertisements daily, generating about $7 billion in annual revenue from these fraudulent ads[2].

Meta's own safety staff estimated that its platforms were involved in one-third of all successful scams in the US, while in Britain, Meta's products were linked to 54% of all payments-related scam losses in 2023[2].

Rather than aggressively combat fraud, Meta charges suspected scammers higher ad rates as a "disincentive"[2]. The company's anti-fraud team operates under strict revenue limits - they can only take actions that would reduce ad revenue by 0.15% ($135 million) even though scam ads generate $7 billion yearly[2].

Internal memos show Meta concluded that potential regulatory fines of up to $1 billion would be far less than their revenue from fraudulent ads[^2]. "It is easier to advertise scams on Meta platforms than Google," stated an internal Meta review from April 2025[2].

Meta spokesman Andy Stone claimed these documents "present a selective view that distorts Meta's approach to fraud and scams" and said the company had "reduced user reports of scam ads globally by 58 percent" over 18 months[2].

[^1]: Reuters - Meta is earning a fortune on fraudulent ads
[^2]: Gulf Times - Internal documents show Meta is earning a fortune on fraudulent ads

50
 
 

cross-posted from: https://scribe.disroot.org/post/5522978

  • ESET has released its latest advanced persistent threat (APT) report, covering the period from April through September 2025.
  • China-aligned APT groups continued to advance Beijing’s geopolitical objectives, increasing the use of the adversary-in-the-middle technique and targeting governments in several Latin American countries.
  • Russia-aligned APT groups intensified their operations against Ukraine and several European Union member states, and expanded their operations.
  • One Russia-aligned threat actor, InedibleOchotense, conducted a spearphishing campaign impersonating ESET.

...

Here is the technical report (pdf)

view more: ‹ prev next ›