Threat Group Uses CAD Malware to Compromise Energy/Automotive Targets

Threat Group Uses CAD Malware to Compromise Energy/Automotive Targets

The industrial espionage group is active since at least 2014

Industrial Espionage Hackers Targeted 130 Companies in More than 30 Countries

Industrial Espionage Hackers Targeted 130 Companies in More than 30 Countries

Crooks deployed the HawkEye spywre for their attacks

Ancient Hackhound Password Stealer Used in Industrial Espionage Campaign

Ancient Hackhound Password Stealer Used in Industrial Espionage Campaign

Crooks used ISR Stealer, a modified version of Hackhound

Snowden: NSA Is Involved in Industrial Espionage

Snowden: NSA Is Involved in Industrial Espionage

Even if the data won't help national security, it is collected for commercial purposes, files indicate

Madi Malware: Another Trojan Targets Organizations from the Middle East

Madi Malware: Another Trojan Targets Organizations from the Middle East

Unlike Stuxnet and Flame, Madi relies on social engineering to infect computers

China Has Access to 80% of Telecoms via Huawei and ZTE Devices, Experts Say

China Has Access to 80% of Telecoms via Huawei and ZTE Devices, Experts Say

The two companies are currently investigated by the US House Intelligence Committee

Industrial Espionage: Chinese Malware Steals Tens of Thousands of AutoCAD Files

Industrial Espionage: Chinese Malware Steals Tens of Thousands of AutoCAD Files

ACAD/Medre.A has mainly impacted computer users from Peru

French Nuke Company Fined After Hacking Greenpeace

French Nuke Company Fined After Hacking Greenpeace

The organization will pay Greenpeace around half a million for damages

Canadian Potash Industry Targeted by Hackers

Canadian Potash Industry Targeted by Hackers

'Wetware' proves itself to be once again the weakest link

Signed Malware Used Valid Realtek Certificate

Signed Malware Used Valid Realtek Certificate

Targeted SCADA system had hard-coded database login details

WM-Powered Phone with Secret Software Installed Gets Stolen

WM-Powered Phone with Secret Software Installed Gets Stolen

Microsoft faces industrial espionage threat as a result of the incident