Tag: APT

A bulletin from the Department of Homeland Security warns that drones made by China-based DJI are collecting sensitive data on US critical infrastructure and industry and giving it to the Chinese government.

Spy Eyes In the Sky: DHS says DJI Drones spy for Chinese Government, Industry

The Department of Homeland Security is warning that commercial drones made by the China-based firm Da Jian Innovations (DJI) may be providing “U.S. critical infrastructure and law enforcement data” to the Chinese government and favored industries in that country, according to a copy of an August, 2017 Intelligence Bulletin (PDF) published by the website Public Intelligence. 

Facebook said thousands of ads that ran on its site in 2015 and 2016 have links to Russian information operations.

Did you give love to Russian Trolls? Facebook will tell you.

Facebook said it will release a feature that lets users see if they liked pages associated with the Internet Research Agency, a Russian troll outfit. 

CrowdStrike says that North Korean hackers have been expanding their list of targets to include defense and financial firms in the US.

North Korea’s widening Net, pricing the Equifax Hack & Dark Markets in Turmoil

In this week’s podcast, after a string of reports about North Korea’s growing forays onto sensitive corporate networks, we speak with Adam Meyers of CrowdStrike about the widening net of North Korean offensive hacking and how the Hermit Kingdom is playing the part both of cyber criminal and nation-state actor.  Also: we unpack the cost of the Equifax breach with Accenture and talk to Flashpoint about the turmoil on the deep, dark web following the shutdown of the AlphaBay marketplace.  Podcast: Play in new window | DownloadSubscribe: Android | RSS

China's government appears to be suppressing information on serious, exploitable security vulnerabilities in software, a study by Recorded Future found.

China delays notification of software holes targeted in state hacks

China is doing a better job finding and disclosing information on software security holes…except when those vulnerabilities are high risk and might be used in targeted attacks. That, according to a report out Thursday by the firm Recorded Future.