Tag CrowdStrike

Chinese Hackers Murky Panda, Genesis, and Glacial Panda Intensify Cloud and Telecom Espionage Efforts

August 22, 2025
Cloud Security / Vulnerability

Cybersecurity experts are alerting the public to the growing threat posed by the China-linked cyber espionage group known as Murky Panda. This group is employing trusted cloud relationships to infiltrate enterprise networks. According to a report from CrowdStrike, “The adversary has demonstrated a significant capacity to rapidly exploit N-day and zero-day vulnerabilities, often gaining initial access by targeting internet-facing devices.” Murky Panda, previously recognized as Silk Typhoon (and formerly Hafnium), gained notoriety for its exploitation of Microsoft Exchange Server vulnerabilities in 2021. Their attacks have primarily focused on government, technology, academic, legal, and professional services sectors in North America. Earlier this March, Microsoft revealed the threat actor’s evolving strategies, particularly their focus on the IT supply chain to gain entry into corporate networks.

Chinese Hackers Murky Panda, Genesis, and Glacial Panda Amplify Cloud and Telecom Espionage Efforts August 22, 2025 – In a recent analysis, cybersecurity experts have flagged a significant escalation in malicious activities orchestrated by a China-linked cyber espionage group known as Murky Panda. This group has been exploiting trusted relationships…

Read More

Chinese Hackers Murky Panda, Genesis, and Glacial Panda Intensify Cloud and Telecom Espionage Efforts

August 22, 2025
Cloud Security / Vulnerability

Cybersecurity experts are alerting the public to the growing threat posed by the China-linked cyber espionage group known as Murky Panda. This group is employing trusted cloud relationships to infiltrate enterprise networks. According to a report from CrowdStrike, “The adversary has demonstrated a significant capacity to rapidly exploit N-day and zero-day vulnerabilities, often gaining initial access by targeting internet-facing devices.” Murky Panda, previously recognized as Silk Typhoon (and formerly Hafnium), gained notoriety for its exploitation of Microsoft Exchange Server vulnerabilities in 2021. Their attacks have primarily focused on government, technology, academic, legal, and professional services sectors in North America. Earlier this March, Microsoft revealed the threat actor’s evolving strategies, particularly their focus on the IT supply chain to gain entry into corporate networks.

Internet Explorer 8 Zero-Day Attack Expands to Nine Additional Websites

May 08, 2013

A recent zero-day attack targeting Internet Explorer 8 on the U.S. Department of Labor’s website has now affected nine more global sites, including those operated by a major European aerospace, defense, and security company, alongside various non-profit organizations and institutions.

The attacks leverage a previously unknown and unpatched vulnerability in Microsoft’s Internet Explorer browser. Researchers have linked this campaign to a China-based hacking group known as “DeepPanda.” Security firm CrowdStrike reports that their investigations indicate the attack commenced in mid-March. Analysis of malicious infrastructure logs revealed visitor IP addresses from 37 different countries, with 71% based in the U.S., 11% in South/Southeast Asia, and 10% in Europe.

Internet Explorer 8 Zero-Day Exploit Expands to Nine Additional Websites May 8, 2013 A zero-day exploit targeting Internet Explorer 8 has spread beyond its initial attack, impacting nine more websites over the weekend. This includes a significant European corporation in the aerospace, defense, and security sectors, along with various non-profit…

Read More

Internet Explorer 8 Zero-Day Attack Expands to Nine Additional Websites

May 08, 2013

A recent zero-day attack targeting Internet Explorer 8 on the U.S. Department of Labor’s website has now affected nine more global sites, including those operated by a major European aerospace, defense, and security company, alongside various non-profit organizations and institutions.

The attacks leverage a previously unknown and unpatched vulnerability in Microsoft’s Internet Explorer browser. Researchers have linked this campaign to a China-based hacking group known as “DeepPanda.” Security firm CrowdStrike reports that their investigations indicate the attack commenced in mid-March. Analysis of malicious infrastructure logs revealed visitor IP addresses from 37 different countries, with 71% based in the U.S., 11% in South/Southeast Asia, and 10% in Europe.

🔍 Weekly Overview: Fortinet Vulnerability, Chrome Zero-Day, BadIIS Malware, Record DDoS Attack, SaaS Security Incident & More

Cybersecurity Weekly Update: New Vulnerabilities and Persistent Threats This week, the cybersecurity landscape revealed alarming developments as multiple organizations fell victim to sophisticated attacks, highlighting the evolving tactics employed by cybercriminals. Notably, Fortinet disclosed a serious vulnerability affecting its FortiWeb application firewall, categorized as CVE-2025-58034. This flaw, assigned a medium…

Read More🔍 Weekly Overview: Fortinet Vulnerability, Chrome Zero-Day, BadIIS Malware, Record DDoS Attack, SaaS Security Incident & More

JetStream Secures $34M Seed Funding to Advance AI Governance

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Ex-CrowdStrike Product Leader Unveils Blueprint Model to Tackle MCP Server Issues and Cost Management Michael Novinson (MichaelNovinson) • March 3, 2026 Raj Rajamani, co-founder and CEO of JetStream (Image: JetStream) JetStream, a startup focusing on artificial intelligence governance, has successfully…

Read MoreJetStream Secures $34M Seed Funding to Advance AI Governance

Iranian Cyber Proxies Engaged, Yet Not Linked to Nation-State Hackers

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Nation-State Hackers Sheltering from Bombardment or Offline Due to Internet Disruptions David Perera (@daveperera), Mathew J. Schwartz (euroinfosec) • March 2, 2026 A U.S. Navy F/A-18E/F Super Hornet launches from an aircraft carrier on Feb. 28, 2026, during Operation Epic Fury, the…

Read MoreIranian Cyber Proxies Engaged, Yet Not Linked to Nation-State Hackers

Why Claude Code Security is Disrupting the Cybersecurity Market

Application Security, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development How Claude’s New AI Code Scanning Tool Will Challenge Application Security Leaders Michael Novinson (MichaelNovinson) • February 23, 2026 The launch of Claude Code Security has positioned Anthropic in direct competition with leading cybersecurity firms, drawing significant attention…

Read MoreWhy Claude Code Security is Disrupting the Cybersecurity Market

U.S. Dismantles Kelihos Botnet Following Arrest of Its Russian Operator in Spain

A prominent Russian hacker was apprehended in Barcelona over the weekend, reportedly for orchestrating a significant computer botnet rather than being linked to last year’s U.S. presidential election hacking as initially suggested by Russian media outlets. The suspect, Peter Yuryevich Levashov, a 32-year-old computer programmer, is believed to have managed…

Read MoreU.S. Dismantles Kelihos Botnet Following Arrest of Its Russian Operator in Spain

Astelia Secures $35M for AI-Driven Vulnerability Management Solutions

Artificial Intelligence & Machine Learning, Governance & Risk Management, Next-Generation Technologies & Secure Development Index Ventures Invests in Comprehensive AI-Driven Vulnerability Management Platform Michael Novinson (MichaelNovinson) • February 24, 2026 Alon Noy, co-founder and CEO, Astelia (Image: Astelia) Astelia, a startup founded by former leaders of Israel’s National Red Team,…

Read MoreAstelia Secures $35M for AI-Driven Vulnerability Management Solutions

Anthropic’s AI Bug Hunter Sparks Surge in Cybersecurity Stocks

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development, The Future of AI & Cybersecurity AI Code Scanner Disrupts a $200B Industry Rashmi Ramesh (rashmiramesh_) • February 22, 2026 Image: Samuel Boivin/Shutterstock Security teams have traditionally struggled with preventing cyber threats, often likened to firefighters overwhelmed by relentless fires.…

Read MoreAnthropic’s AI Bug Hunter Sparks Surge in Cybersecurity Stocks