China
CEO says the decision to shift focus away from closed models is "doubly advantageous" for the company
Threat actor decrypts malicious payloads and executes them in memory, leaving 'minimal forensic traces.'
A group called 'APT40' working for China's Ministry of State Security is allegedly capable of exploiting POCs within hours or days of public release
Estonian ex-prez Ilves and Columbia Law prof deliver stark warning to cyberpros
ByteDance spins up new “Influence Operations Intelligence” team in a further bid to head off complaints.
China has built itself into a cyberattack powerhouse unrivaled by any other nation, according to the head of the FBI
Threat actors in China have been using fake profiles and AI engines to generate inflammatory content around major news and election events in the US
"The loss of a signing key is a serious problem, but the loss of a signing key through unknown means is far more significant... Microsoft’s customers did not have essential facts needed to make their own risk assessments."
Group screwed up their opsec, let Trend Micro pull samples, configuration files, and log files from attackers' servers.