DataCenterNews US - Specialist news for cloud & data center decision-makers

Cyber espionage stories

Moody us govt office laptop suspicious email shadowy figure

LOTUSLITE backdoor targets US policy bodies with lures

2 days ago
#
cyber espionage
Politically themed LOTUSLITE phishing campaign hits US policy bodies, using DLL sideloading and espionage-focused backdoor tactics.
Smart home night scene shadowy fox iot cyber espionage threat

Silver Fox APT & PowerG flaws expose key security risks

Last week
#
cyber espionage
NCC Group links Silver Fox’s false-flag malware campaigns to ValleyRAT and uncovers critical PowerG flaws that can fully compromise alarms.
Office worker phishing qr code lock icon cloud account attack

Proofpoint warns of surge in Microsoft device code phishing

This month
#
cyber espionage
Proofpoint flags a sharp rise in Microsoft 365 account takeovers via device code phishing, hitting firms from finance to government.
Ai cyber espionage ransomware small business office night scene

AI & state-backed cyber spies to drive 2026 threats

Last month
#
cyber espionage
AI-fuelled hacks and state cyber spies are tipped to dominate 2026, targeting drones, defence firms and vulnerable smaller businesses.
Covert cyber espionage software download bug warning china russia

Chinese hackers fake Teams downloads in false flag ploy

Last month
#
cyber espionage
Chinese state-backed hackers mimic Microsoft Teams downloads in a false flag campaign to infect Chinese speakers and blame Russian actors.
Nicole henry 1422x800px

Security architecture for critical infrastructure: stabilising what cannot stop

Last month
#
cyber espionage
Australia’s critical infrastructure faces rising state-backed cyber threats, forcing a shift to integrated, cloud-first security architectures.
Ciso boardroom ai cyber threats glowing screens city night

CISOs face rising scrutiny as AI escalates cyber risk

Last month
#
cyber espionage
CISOs are warned 2026 will bring harsher board scrutiny, AI-fuelled attacks, bigger budgets - and far less tolerance for cyber failure.
Night cyber ops room ai testing monitors threat alerts vigilance

AI-native attacks drive shift to continuous cyber tests

Last month
#
cyber espionage
AI-native cyber attacks and synthetic IDs are forcing firms to shift from periodic checks to continuous, AI-driven security testing by 2026.
Shield emblem cloud server network icons blocking malware symbols

CrowdStrike hits 100% in latest MITRE ATT&CK tests

Last month
#
cyber espionage
CrowdStrike’s Falcon platform scores 100% detection and protection with zero false positives in MITRE ATT&CK’s toughest cloud-era tests.
Secure enterprise network shield servers laptops cloud threat detection

CrowdStrike hits 100% in latest MITRE cross-domain tests

Last month
#
cyber espionage
CrowdStrike’s Falcon platform scores 100% detection and protection with no false positives in MITRE’s toughest cross-domain ATT&CK tests yet.
Us corporate cyber control room incident response dashboard

Cyber leaders tip 2026 shift to resilience over prevention

Last month
#
cyber espionage
Cyber chiefs predict 2026 cyber budgets will pivot from prevention and box-ticking to rapid response, recovery and demonstrable resilience.
Magnifying glass examining network hidden ai systems discovered security

SandboxAQ tool boosts AI security by tracking hidden systems

Last month
#
cyber espionage
SandboxAQ launches AQtive Guard AI-SPM to help firms track hidden AI use and tackle security risks from unmonitored 'shadow AI' deployments.
Dark server room digital locks breaking data streams korean won currency graphic

Qilin ransomware targets 25 Korean finance firms in cyber surge

Tue, 25th Nov 2025
#
cyber espionage
Qilin ransomware group has targeted 25 South Korean finance firms using managed service providers, exposing 2TB of data in a politically charged cyberattack surge.
Digital padlock quantum waves circuit board urgent digital protection

Quantum threats to drive overhaul of cybersecurity by 2026

Sat, 22nd Nov 2025
#
cyber espionage
Quantum cyber threats force organisations to urgently adopt post-quantum cryptography and strengthen critical infrastructure defences by 2026.
Dark server room network cables shadowy guards digital locks cybercrime security threats hosting

US, UK & Australia sanction Russian host over ransomware links

Fri, 21st Nov 2025
#
cyber espionage
The US, UK and Australia have sanctioned Russian web-host Media Land and its leaders for aiding ransomware attacks via bulletproof hosting services.
Fortified digital shield binary codes new zealand map cyber defence national protection

New Zealand cyber defence firm wins top award amid daily attacks

Thu, 20th Nov 2025
#
cyber espionage
New Zealand’s cybersecurity firm DEFEND clinched Microsoft’s Global Security Partner of the Year amid rising state-backed cyber attacks targeting local businesses daily.
Cybersecurity professionals office digital network new zealand map defenses

DEFEND wins global Microsoft award as cyber threats surge in NZ

Wed, 19th Nov 2025
#
cyber espionage
New Zealand cybersecurity firm DEFEND wins Microsoft’s Global Security Partner of the Year amid rising cyber threats to public and private sectors.
Michael freeman

2026: The Year an Individual Operates Like a Nation-State

Tue, 18th Nov 2025
#
cyber espionage
By 2026, AI will empower individuals with hacker tools rivaling nation-states, radically transforming cyber threats and defences worldwide.
Shadowy figure computer digital network lines abstract data streams cyber espionage security threats

Anthropic identifies AI-driven cyber-espionage campaign

Sat, 15th Nov 2025
#
cyber espionage
A China-linked group launched a major AI-driven cyber-espionage campaign targeting global firms, performing 80-90% of hacking with minimal human input.
Photorealistic hooded figure at computer with floating digital locks warnings cybercrime

AI & ransomware reshape cyber threat landscape, report finds

Thu, 13th Nov 2025
#
cyber espionage
Rapid7's report reveals cyber threats evolving with AI-powered phishing, rising ransomware alliances, and faster exploitation of vulnerabilities worldwide.