News

Ransomware has officially entered the Microsoft SharePoint exploitation ring. Late Wednesday, in an update to its earlier ...
A July 8 fix for a critical SharePoint zero-day failed to stop active exploitation, enabling state-backed attackers to breach ...
Storm-2603 exploits SharePoint flaws to deploy Warlock ransomware, affecting 400+ victims. Microsoft urges mitigation.
Two of the crews behind the zero-day attacks are government-backed: Linen Typhoon (aka Emissary Panda, APT27) and Violet Typhoon (aka Zirconium, Judgment Panda, APT31), Microsoft's threat intel team ...
Microsoft said an attack campaign targeting zero-day vulnerabilities in on-premises SharePoint servers appears to have begun ...
Microsoft has observed three China-based threat actors, Linen Typhoon, Violet Typhoon and Storm-2603, exploiting the ...
Calling out Chinese-linked hacking has become more common, particularly among Western countries. Read more at straitstimes.com. Read more at straitstimes.com.
In a blog post Tuesday, Microsoft said it observed hackers attempting to “gain initial access to target organizations.” ...
The Czech Republic says the Chinese-backed APT31 hacking group was behind cyberattacks targeting the country's Ministry of Foreign Affairs and critical infrastructure organizations.
Chinese state‑linked hackers have now been confirmed as the driving force behind the “ToolShell” attacks that are ripping ...
Microsoft links SharePoint attacks to three China-based groups; flaws allow code execution and data theft on unpatched ...