24 May 2019

Russian Nation-State Hacking Unit’s Tools Get More Fancy

New research by ESET shows that the notorious Russian hacking group Fancy Bear (aka APT28, Sofacy, STRONTIUM, Sednit group) is rapidly increasing the sophistication of the cyber-espionage tools in its arsenal. The study found that Zebrocy malware, a key tool in Fancy Bear attack campaigns, contains over 30 commands to

Read More
22 May 2019

Trump Administration Could Blacklist China’s Hikvision, a Surveillance Firm

The US government may blacklist Chinese video surveillance giant Hikvision in order to prevent it from purchasing US technology. The Trump administration is expected to decide on this issue in the next few weeks. China uses Hikvision’s surveillance products to monitor the oppressed Muslim Uyghur minority in its Xinjiang region, but

Read More
22 May 2019

It’s not just WhatsApp, most messaging apps likely have security vulnerabilities

Cybersecurity experts warn that the recent Whatsapp vulnerability that allowed cyberattacker to remotely install malicious software on mobile phones, is unlikely to be the only flaw of that kind affecting messaging applications. In fact, Tom Uren of the International Cyber Policy Centre (ICPC) believes that “pretty much the entire suite

Read More
21 May 2019

US Delays Huawei Ban for 90 Days

The US Department of Commerce is temporarily delaying the consequences of President Donald Trump’s recent executive order enabling the government to forbid US firms from using Huawei telecommunications equipment. The Commerce Department issued a 90-day license “that grants operators time to make other arrangements and (gives) the Department space to

Read More
21 May 2019

DHS warns of ‘strong concerns’ that Chinese-made drones are stealing data

The US Department of Homeland Security is warning that drones manufactured in China are a “potential risk to an organization’s information,” because they are capable of sending sensitive flight data to servers that may be accessed by the manufacturer as well as by other parties, such as the Chinese government.

Read More
20 May 2019

Huawei’s use of Android restricted by Google

In response to US President Donald Trump’s recent executive order enabling the US government to ban the use of Huawei telecommunications equipment by US firms, Google has made certain updates for its Android operating system unavailable to the Chinese tech giant, which is the world’s second largest producer of smartphones.

Read More
17 May 2019

EU leaders: We won’t follow Trump’s Huawei ban

One day after US President Donald Trump declared a national emergency over telecom threats, thereby enabling the US government to extend its ban on Huawei technology to the private sector, the leaders of Germany, the Netherlands and France announced that their countries are not planning to copy the US government’s

Read More
16 May 2019

Huawei hits back after Trump declares national emergency on telecoms ‘threat’

As many analysts expected, US President Donald Trump on Wednesday signed an executive order enabling it to forbid US firms from using Huawei telecommunications equipment. The order signed by Trump does not mention Huawei in particular, but effectively targets the Chinese tech giant by declaring a national economic emergency and

Read More
15 May 2019

Trump is reportedly preparing to sign an executive order that would enable a ban on Huawei in the US

US President Donald Trump is expected to sign an executive order this week that would allow the US government to bar US organizations from using telecommunications equipment from firms if this use is considered to represent a national security risk. The order, which comes in the midst of new trade

Read More
15 May 2019

Single server ties hacked diplomatic cables to Chinese cyberattacks worldwide

Researchers with the BlackBerry Cylance Threat Intelligence team have discovered that a previously uncovered Chinese hacking campaign targeting correspondence between European Union (EU) diplomats, is related to a host of other campaigns by “disparate” Chinese hacking groups. The researchers found that the campaigns make use of a single command-and-control (C2)

Read More