Creators of Panda Virus Tried for Running Illegal Gambling Website

Creators of Panda Virus Tried for Running Illegal Gambling Website

The Chinese cybercriminals couldn't stay away from the dark side

The Washington Post Hacked Again, Employee Credentials Compromised

The Washington Post Hacked Again, Employee Credentials Compromised

Similar to previous attacks, Chinese hackers are the main suspects

Chinese Hackers Breach US Federal Election Commission During Government Shutdown

Chinese Hackers Breach US Federal Election Commission During Government Shutdown

All the agency's employees were furloughed when the attack was launched

Five European Countries Targeted by Chinese Hackers Before G20 Summit <em>Reuters</em>

Five European Countries Targeted by Chinese Hackers Before G20 Summit Reuters

Researchers say there's no evidence that the attackers are linked to the government

Database of 20 Million Hotel Reservations Leaked by Chinese Hackers

Database of 20 Million Hotel Reservations Leaked by Chinese Hackers

The information is available on a number of locations, including WeChat

Chinese Hackers Change Tactics, but Don’t Stop Attacks Against the US <em>Reuters</em>

Chinese Hackers Change Tactics, but Don’t Stop Attacks Against the US Reuters

They only took a brief break after Mandiant published its report in February

Trend Micro Publishes Report on Chinese Cybercriminal Underground

Trend Micro Publishes Report on Chinese Cybercriminal Underground

These cyber crooks mostly use forums and QQ chat groups

Israeli Authorities Accuse China of Launching Cyberattacks Against Defense Industry

Israeli Authorities Accuse China of Launching Cyberattacks Against Defense Industry

140 executives and program officials have been sent malicious emails

China Conducts Cyber Espionage Campaign Against Mongolia

China Conducts Cyber Espionage Campaign Against Mongolia

China wants to learn about Mongolia’s relations with its allies

Chinese Group Hacks Philippines Site in Protest Against Manila Hostage Incident

Chinese Group Hacks Philippines Site in Protest Against Manila Hostage Incident

The hackers demand a formal apology from the president of the Philippines

Chinese Cybercriminals Leverage G-20 Summit in Espionage Campaigns

Chinese Cybercriminals Leverage G-20 Summit in Espionage Campaigns

Rapid7 researchers have analyzed three different attacks

Chinese Defense Minister: Our Military Has Never Supported Hack Attacks

Chinese Defense Minister: Our Military Has Never Supported Hack Attacks

Chang Wanquan made a statement during a visit to the US

Chinese Hackers Develop Automated Tools to Exploit Apache Struts Vulnerabilities

Chinese Hackers Develop Automated Tools to Exploit Apache Struts Vulnerabilities

Users are advised to update their installations to protect themselves against attacks

New York Times Hackers Prepare New Attacks with Improved Malware

New York Times Hackers Prepare New Attacks with Improved Malware

FireEye researchers say the cybercriminals are using updated versions of Ixeshe and Aumlib

Expert Uses Decoy Water Plant to Show Chinese Hackers Are Targeting ICS

Expert Uses Decoy Water Plant to Show Chinese Hackers Are Targeting ICS

Trend Micro's Kyle Wilhoit presented his findings at Black Hat 2013

Official Says Chinese Hacking Operations Have Cost the US $2TN / €1.5TN

Official Says Chinese Hacking Operations Have Cost the US $2TN / €1.5TN

North Korea, Iran and Russia are also accused of launching cyberattacks

Chinese Hackers Test Their Skills on Taiwan <em>Reuters</em>

Chinese Hackers Test Their Skills on Taiwan Reuters

Up to 30 spear phishing emails are sent to government employees each month

 
Want more? Browse: