Check Point Research’s excavation of the Ink Dragon cluster reveals a precise, quietly ruthless evolution in modern espionage tradecraft: instead of treating each victim as a disposable data source, the operators systematically convert compromised IIS and SharePoint servers into active nodes in...
Attackers have weaponized a recently patched Windows Server Update Services (WSUS) remote code execution bug (CVE‑2025‑59287) to gain SYSTEM-level access to WSUS hosts and deliver the ShadowPad backdoor, using native Windows tools and simple staging techniques that make detection and containment...
Attackers leveraged a newly patched Windows Server Update Services (WSUS) remote code execution flaw, CVE‑2025‑59287, to gain SYSTEM‑level access on WSUS hosts and install the ShadowPad backdoor, according to coordinated industry and vendor reporting that ties emergency Microsoft fixes...
The latest report from cybersecurity firm ESET has once again shone a harsh light on the evolving tactics of China-aligned advanced persistent threat (APT) groups. In a high-stakes campaign spanning across the Americas, the notorious FamousSparrow – also known as Salt Typhoon – has deployed its...