#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

40 C
Dubai
Monday, July 21, 2025
HomeTopics 2Cyberespionage Spying

Cyberespionage Spying

spot_imgspot_imgspot_imgspot_img

APT41 Unmasked: Chinese Cyber-Espionage Group Uses Google Calendar for Covert Attacks

On 23 October 2024, Google’s Threat Intelligence Group (GTIG) revealed a sophisticated campaign by Chinese state-linked threat actor APT41, leveraging Google Calendar as command-and-control...

Void Blizzard: Russia-Linked Threat Actor Escalates Cyberespionage on Critical Sectors Globally

A newly identified Russia-affiliated threat actor Void Blizzard (also tracked as LAUNDRY BEAR) has ramped up cyberespionage campaigns against key sectors across Europe, North...

Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents

Between January and February 2025, TAG-110, a Russia-aligned cyber-espionage group linked to APT28, launched a targeted phishing campaign against Tajikistan using macro-enabled Word template...

Marbled Dust Exploits Zero-Day in Output Messenger to Spy on Kurdish Targets: Inside a Sophisticated Regional Espionage Campaign

In April 2024, a covert cyber-espionage campaign shook the Middle Eastern cybersecurity landscape. Microsoft Threat Intelligence uncovered a zero-day exploit in the widely used...

Unmasking KoSpy: North Korean APT37’s Latest Espionage Tool Targeting Android Users

In the ever-evolving landscape of cyber threats, nation-state actors continually refine their tactics to infiltrate and exploit targets. One such group, North Korea's Advanced...

WhatsApp Exposes Israeli Spyware Targeting Journalists and Civil Society Members

WhatsApp, the widely used messaging platform owned by Meta, has revealed that nearly 100 journalists and civil society members were targeted by Paragon Solutions'...

Russian Actor Secret Blizzard Exploits Tools of Other Groups to Attack Ukraine

In a recent revelation, the Russian cyber-espionage group known as Secret Blizzard has been observed leveraging the tools and infrastructure of other threat actors...

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img