The Chinese hacking group gained persistent access to a popular mapping tool by turning one of its features into a webshell and hardcoding access, according to ReliaQuest. (Image Via Getty)
The Chinese hacking group gained persistent access to a popular mapping tool by turning one of its features into a webshell and hardcoding access, according to ReliaQuest.
The Signal encrypted messaging application is seen on a mobile device in this illustration photo taken in Warsaw, Poland on March 25, 2025. (Photo by Jaap Arriens/NurPhoto)
Phantom Taurus has stolen sensitive data from ministries of foreign affairs, embassies, diplomats and telecom networks in the Middle East, Africa and Asia, researchers said.
The agency, which issued an emergency directive to federal agencies Thursday, said it took months to determine the root cause and mitigate the activity.
Cisco said it was investigating state-sponsored espionage attacks in May. CISA did not explain why it waited four months to issue an emergency directive.
Billionaire Elon Musk, then-head of the Department of Government Efficiency (DOGE), holds a chainsaw as he speaks at the annual Conservative Political Action Conference (CPAC) at the Gaylord National Resort Convention Center at National Harbor in Oxon Hill, Maryland, on Feb. 20, 2025. (Photo by SAUL LOEB / AFP)