Here is a summary of the main points from the article on The Register regarding China's accusation against US intelligence:
Chinese Claims: China has accused US intelligence agencies of exploiting a Microsoft Exchange zero-day vulnerability to steal defense-related data and control more than 50...
china
chinese military
cyber defense
cyber espionage
cyber intrusions
cyberattack
cybersecurity
datatheft
digital warfare
exchange server
information security
international cyber conflicts
military cybersecurity
network security
state-sponsored hacking
us china relations
us intelligence
zero-day vulnerabilities
In recent developments, cybersecurity researchers have uncovered a sophisticated malware campaign targeting Microsoft Windows users. Attackers are deploying deceptive websites that mimic popular brands to trick individuals into downloading malicious applications. These counterfeit sites often...
Microsoft Windows users across the globe are facing a new and insidious threat that exploits a trusted channel—genuine purchase notification emails from Microsoft itself. In a sophisticated campaign first discovered by the security research team at Kaspersky, attackers are leveraging real...
In recent months, a formidable cyber threat known as Lumma Stealer has emerged, compromising nearly 400,000 Windows PCs worldwide between March 16 and May 16, 2025. This malware, also referred to as LummaC2, is a sophisticated information stealer offered as Malware-as-a-Service (MaaS) by a group...
In a significant cybersecurity operation, Microsoft, in collaboration with global law enforcement agencies, has dismantled the Lumma Stealer malware network, which had infected approximately 394,000 Windows computers worldwide between March 16 and May 16, 2025. This malware, notorious for its...
In the fast-evolving world of cybercrime, the disruption of a single malware operation can alter threat landscapes worldwide—especially when that malware is central to countless cybercriminal campaigns. In May 2025, Microsoft, leveraging the expertise of its Digital Crimes Unit (DCU) in...
A surge of deceptive AI-powered video generation tools has recently been identified as the latest vehicle for distributing a new, highly sophisticated information-stealing malware family known as Noodlophile. According to a detailed report from Morphisec and corroborated by cybersecurity news...
ai scams
av evasion
botnet exfiltration
cyber threats
cybercrime
cybersecurity
dark web
datatheft
emerging threats
endpoint security
fake ai tools
information stealer
malware
malware-as-a-service
memory only malware
noodlophile
social engineering
threat intelligence
video generation malware
windows security
The growing adoption of generative AI in the workplace has ushered in sweeping changes across industries, delivering newfound efficiencies and innovative capabilities. Yet, with each leap toward automation and intelligence, a parallel, shadowy world of cyber threats surges ahead. A recent...
A long-dormant flaw in Windows is now capturing the attention of cybersecurity experts and government agencies alike, as a Windows zero-day vulnerability—active since 2017—has been weaponized by 11 nation-state actors. The exploit, tracked as ZDI-CAN-25373, manipulates the way Windows handles...
Cybercriminals are now weaponizing trusted brands to hijack Microsoft 365 accounts. In a worrying twist that almost seems ripped from a spy movie, hackers are impersonating legitimate Adobe and DocuSign apps to gain unauthorized access to valuable data and deploy malware.
The Anatomy of the...
A fresh cybersecurity challenge is emerging for organizations worldwide—a sophisticated malware family that uses Microsoft Outlook as a key communication channel to steal data. In a report detailed by CSO Online, researchers from Elastic Security have uncovered an attack that leverages...
On November 12, 2024, the Microsoft Security Response Center (MSRC) unveiled a new advisory regarding the CVE-2024-49033 vulnerability, which is described as a security feature bypass in Microsoft Word. While the specifics surrounding the vulnerability are minimal in the published update, it...
Original release date: February 24, 2021
Summary
This joint advisory is the result of a collaborative effort by the cybersecurity authorities of Australia,[Link Removed] New Zealand,[2] Singapore,[3] the United Kingdom,[4] and the United States.[Link Removed][6] These authorities are aware of...
Original release date: December 10, 2020<br/><h3>Summary</h3><p>This Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).</p>...
Long story short, a while ago, I bought and returned a hard drive that still had sensitive information on it including social security number, passwords to online accounts, etc. At the time, I thought that I removed all the information on the hard drive because I quick formatted it a few times...
data disposal
data management
data overwrite
data recovery
data security
datatheft
disk image
hard drive
hard drive hygiene
manufacturer practices
online security
privacy
quick format
sanitization
social security
storage safety
stress
user concerns
worry
Original release date: October 28, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.
This joint cybersecurity advisory...
Original release date: September 22, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques.
This product was written by the Cybersecurity and...
Original release date: May 5, 2020
Summary
This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
CISA and NCSC continue to see indications that...
Original release date: January 6, 2020
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions...
For one they are a Chinese company and Chinese and tech you're just asking for data theft and espionage .
Indictment coverage
https://www.cnn.com/2019/01/29/tech/us-indictment-huawei-takeaways/index.html
Actual DOJ Indictment
Link Removed