News brief: Nation-state hackers active on the global stage

<p>The world can be a dangerous place, and the nation-state hackers targeting critical infrastructure aren’t making it any safer.</p>
<p>In fact, the number of cyberattacks threatening the nation’s infrastructure is escalating. The “IBM X-Force 2025 Threat Intelligence Index” <a target=”_blank” href=”https://www.ibm.com/downloads/documents/us-en/1227cc9e83cb97ae” rel=”noopener”>found</a> that 70% of all cyberattacks in 2024 involved critical infrastructure.</p>
<p>From defense systems and telecommunications networks to biometric databases, no sector or system is immune to these <a href=”https://www.techtarget.com/searchsecurity/tip/Top-6-critical-infrastructure-cyber-risks”>sophisticated threats</a>. Nation-state adversaries and their proxies are exploiting vulnerabilities to impede defense capabilities, undermine production, disrupt communications and access sensitive data.</p>
<p>This week’s featured news serves as a stark reminder of the urgent need for strong cybersecurity measures to protect critical systems from <a href=”https://www.techtarget.com/searchsecurity/feature/What-executives-must-know-about-nation-state-threat-actors”>state-sponsored threats</a>, safeguard citizens’ data and maintain global stability.</p>
<section class=”section main-article-chapter” data-menu-title=”Nation-state hackers put defense industrial base under siege”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Nation-state hackers put defense industrial base under siege</h2>
<p>Nation-state hackers are intensifying attacks on defense firms and the U.S. defense industrial base, targeting sensitive data and intellectual property.</p>
<p>Google researchers found that espionage groups from countries including China, Russia and North Korea have compromised at least two dozen organizations by exploiting zero-day vulnerabilities in edge devices, such as VPNs and gateways. Such campaigns aim to steal military secrets, disrupt operations and gain strategic advantages.</p>
<p><a target=”_blank” href=”https://www.darkreading.com/cyber-risk/nation-state-hackers-defense-industrial-base-under-siege” rel=”noopener”><i>Read the full article by Robert Lemos on Dark Reading</i></a><i>.</i></p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Newly identified hacking groups gain access to OT environments”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Newly identified hacking groups gain access to OT environments</h2>
<p>Security researchers from Dragos have identified three new hacking groups targeting operational technology (OT) environments. The groups, dubbed Sylvanite, Azurite and Pyroxene, are exploiting vulnerabilities in critical infrastructure, raising concerns about the security of OT systems, which are essential for industries including energy, manufacturing and transportation.</p>
<p>The researchers highlighted the growing sophistication of cyberattacks, with threat actors using advanced techniques, including initial access brokers, <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-prevent-living-off-the-land-attacks”>living-off-the-land techniques</a> and social engineering, to breach networks.</p>
<p><a target=”_blank” href=”https://www.cybersecuritydive.com/news/new-hacking-groups-access-ot-environments/812323/” rel=”noopener”><i>Read the full article by David Jones on Cybersecurity Dive</i></a><i>.</i></p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Singapore and its major telcos fend off Chinese hackers”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Singapore and its major telcos fend off Chinese hackers</h2>
<p>Singapore’s cybersecurity agencies and its four major telecommunications companies successfully defended against a prolonged cyberattack campaign linked to Chinese state-sponsored hackers.</p>
<p>The 11-month operation, dubbed Cyber Guardian, involved 100 incident responders across government and private sectors to protect the critical infrastructure. Despite successfully breaching some systems, the attackers did not compromise any personal data or disrupt any services.</p>
<p><a target=”_blank” href=”https://www.darkreading.com/cyberattacks-data-breaches/singapore-major-telcos-fend-chinese-hackers” rel=”noopener”><i>Read the full article by Robert Lemos on Dark Reading</i></a><i>.</i></p>
</section>
<section class=”section main-article-chapter” data-menu-title=”Hackers breach Senegal national biometric database”>
<h2 class=”section-title”><i class=”icon”

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: