TechDay US - America's technology news network

Cyber espionage stories

04062026001

China-aligned TA416 resumes spying on EU & Mideast

Last week
#
phishing
#
email security
#
cybersecurity
China-linked TA416 returns to spying on European diplomats and later expands attacks to Middle Eastern government targets after Iran conflict.
Flux result 171281d8 fa44 459c a8d5 363abbfe16a0

China-linked Red Menshen hides inside telecoms networks

Last month
#
uc
#
advanced persistent threat protection
#
supply chain
Rapid7 says China-linked Red Menshen has planted dormant “sleeper cells” inside global telecoms networks to quietly maintain long-term access.
Editorial world map storm network lines ransomware hooded nodes

CrowdStrike flags faster AI-driven cyber attacks worldwide

Last month
#
ransomware
#
cloud security
#
phishing
AI-fuelled cyber attacks are spreading faster worldwide, CrowdStrike warns, as breakout times plummet and criminals weaponise mainstream tools.
Dark cyberattack control room western critical infra collapse

Iranian cyber shift raises risk to Western infrastructure

Last month
#
ddos
#
dr
#
ransomware
Iranian state-aligned hackers are shifting from spying to destructive cyber strikes, putting Western critical infrastructure on high alert.
Smartphone red siren app shadowy cables israel data surveillance

Fake Red Alert app used in Android spyware smishing

Last month
#
endpoint protection
#
mdm
#
phishing
Attackers push fake Red Alert Android app via SMS, turning Israel rocket warning tool into spyware that steals messages, contacts and location.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last month
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Hooded hacker in dim middle east government office night scene

Conflict sparks surge in Middle East cyber espionage

Last month
#
phishing
#
email security
#
cybersecurity
New research links Iran conflict to a swift surge in tightly targeted cyber espionage across Middle Eastern governments and embassies.
Untitled design   2026 03 10t211837.920

Wireless CVEs surge, exposing hidden risks for AI centres

Last month
#
uc
#
firewalls
#
surveillance
Wireless flaws have surged 230-fold since 2010, as Bastille warns AI data centres and critical infrastructure face escalating unseen risks.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Last month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Cinematic cloud server room ai identity theft masked attackers

Cloudflare flags AI-fuelled identity & SaaS attacks

Last month
#
saas
#
firewalls
#
ddos
Cloudflare warns AI-driven identity fraud and SaaS abuse are reshaping cybercrime, as global costs hit USD $10.5 trillion a year.
Telecom server room dragon shadow sliced by cyber shield

Google disrupts China-linked cyber espionage on telecoms

Thu, 26th Feb 2026
#
malware
#
firewalls
#
data protection
Google says it has crippled a China-linked cyber espionage group accused of hacking telecoms and governments in at least 42 countries.
Dark control room ai ransomware cloud cyberattack red lock scene

AI-driven cyber threats grow as breakouts accelerate

Thu, 26th Feb 2026
#
virtualisation
#
ransomware
#
cloud security
AI-fuelled ransomware, rapid cloud intrusions and identity abuse are transforming cyber risk, slashing response times for defenders.
Oil refinery renewables control room power loss venting steam dusk tension

OT cyber threats shift from spying to disruption in 2025

Wed, 18th Feb 2026
#
ransomware
#
iot security
#
advanced persistent threat protection
Cyber attacks on industrial systems in 2025 shifted from quiet spying to coordinated operations aiming to disrupt critical infrastructure.
Moody ai cyber ops room global map pulsing network lines

AI drives shift to persistent, low‑level cyber conflict

Sun, 15th Feb 2026
#
malware
#
firewalls
#
network infrastructure
Cyber operations have become constant, covert pressure in geopolitics, with AI-fuelled identity abuse replacing headline-grabbing cyberattacks.
Moody datacenter night glowing shield cyber espionage ai theft

Google warns of AI model theft & state-backed misuse

Thu, 12th Feb 2026
#
malware
#
surveillance
#
cloud security
Google flags surging attempts to steal AI models as state-backed hackers weaponise Gemini for phishing, intel gathering and malware support.
Untitled design  24

Espionage Without Noise: Understanding APT36's Enduring Campaigns

Wed, 11th Feb 2026
#
ddos
#
surveillance
#
supply chain
Indian defence faces a decade-long silent siege as APT36 refines cross-platform cyber espionage with stealthy, persistent RAT campaigns.
Crowdstrike

CrowdStrike splits LABYRINTH CHOLLIMA into three units

Fri, 30th Jan 2026
#
malware
#
manufacturing
#
crypto
CrowdStrike has split North Korea-linked LABYRINTH CHOLLIMA into three units, two for crypto theft and one for industrial espionage.
Smart home night shield blocks botnet global network takedown

Google disrupts IPIDEA's global hijacked device network

Thu, 29th Jan 2026
#
malware
#
firewalls
#
data protection
Google has dismantled IPIDEA's vast residential proxy network, which hijacked millions of consumer devices for global cyber operations.
Moody us govt office laptop suspicious email shadowy figure

LOTUSLITE backdoor targets US policy bodies with lures

Thu, 22nd Jan 2026
#
phishing
#
advanced persistent threat protection
#
email security
Politically themed LOTUSLITE phishing campaign hits US policy bodies, using DLL sideloading and espionage-focused backdoor tactics.
Smart home night scene shadowy fox iot cyber espionage threat

Silver Fox APT & PowerG flaws expose key security risks

Tue, 13th Jan 2026
#
uc
#
encryption
#
iot security
NCC Group links Silver Fox's false-flag malware campaigns to ValleyRAT and uncovers critical PowerG flaws that can fully compromise alarms.