Counterfeiting ring collected discarded chips, polished and rebranded them as originating from Infineon, Texas Instruments, Analog Devices This article has been indexed from Silicon UK Read the original article: Chinese Police Break Up Counterfeit Chip Gang
Category: EN
Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads
Threat intelligence researchers have uncovered a growing campaign where cybercriminals are weaponizing AdaptixC2, a legitimate open-source Command and Control framework designed for authorized penetration testers. The discovery reveals how threat actors are exploiting ethical hacking tools to conduct sophisticated cyberattacks,…
How to Hack a Poker Game
This week on Uncanny Valley, we break down how one of the most common card shufflers could be altered to cheat, and why that matters—even for those who don’t frequent the poker table. This article has been indexed from Security…
Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications
A nation-state actor, likely a China-nexus one, hacked the U.S.-based technology company Ribbon Communications. Ribbon Communications is a U.S.-based technology company that provides telecommunications and networking. Ribbon Communications employs approximately 3,052 people as of December 31, 2024. The company reported…
CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a severe injection vulnerability in the XWiki Platform, designated as CVE-2025-24893. This flaw allows unauthenticated attackers to execute arbitrary remote code, posing significant risks to organizations…
AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID
AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has become a favored weapon in the hands of sophisticated threat actors. The tool, which is part of the BloodHound suite, was originally created to help…
Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations
Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations across East and Southeast Asia. The campaign leverages carefully crafted ZIP file lures combined with region-specific web templates to deceive users into downloading staged malware…
Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access
Threat actors operating under the control of North Korea’s regime have demonstrated continued technical sophistication by introducing advanced malware toolsets designed to establish persistent backdoor access and remote control over compromised systems. Recent findings have revealed that Kimsuky, known for…
Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target European diplomatic entities across Hungary, Belgium, Serbia, Italy, and the Netherlands. Arctic Wolf researchers identified this sophisticated cyber espionage campaign operating throughout September and October…
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from Australia and Canada, have released guidance to harden on-premise Microsoft Exchange Server instances from potential exploitation. “By restricting administrative access, implementing multi-factor…
Dutch Nexperia Seizure In Doubt After US Policy Shift
Netherlands seizure of chipmaker Nexperia faces questions after US agrees to suspend key sanctions rule as part of China deal This article has been indexed from Silicon UK Read the original article: Dutch Nexperia Seizure In Doubt After US Policy…
China Suspends Latest Rare-Earth Controls
China delays new rare-earth controls for one year amid wider US trade deal, but leaves in place earlier restrictions This article has been indexed from Silicon UK Read the original article: China Suspends Latest Rare-Earth Controls
Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw
Progress Software has released security patches to address a high-severity vulnerability in its MOVEit Transfer platform discovered on October 29, 2025. The flaw, tracked as CVE-2025-10932, affects the AS2 module and allows attackers to consume system resources without proper restrictions. Attribute…
Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were leaked within Visual Studio Code (VS Code) extensions published in the marketplace. The action comes following a…
Researchers Develop Linux Rootkit That Evades Elastic EDR Protections
Security researchers have unveiled a sophisticated Linux rootkit capable of bypassing Elastic Security’s advanced detection mechanisms, demonstrating critical vulnerabilities in endpoint detection and response solutions. The Singularity rootkit employs multiple obfuscation and evasion techniques to defeat static signature analysis and…
Windows LNK UI Spoofing Vulnerability Weaponized for Remote Code Execution
A sophisticated cyber espionage campaign targeting European diplomatic institutions has been uncovered, signaling a strategic escalation by Chinese-affiliated threat actor UNC6384. Central to this campaign is the exploitation of the Windows shortcut (LNK) UI misrepresentation vulnerability—ZDI-CAN-25373, first disclosed in March…
Meta, Microsoft, Google Report Rising AI Expenses
Three tech giants all report rapidly rising capital expenditures on AI, amid growing fears of a technology bubble This article has been indexed from Silicon UK Read the original article: Meta, Microsoft, Google Report Rising AI Expenses
Equinix Lowers Expectations On Economic Uncertainty
Major data centre operator lowers annual revenue forecast as wider economic uncertainty delays major lease deal This article has been indexed from Silicon UK Read the original article: Equinix Lowers Expectations On Economic Uncertainty
Virgin Media O2 To Offer Mobile Satellite Links In Rural Areas
Virgin Media O2 to offer satellite-based data connectivity to compatible smartphones in hard-to-reach areas through Starlink deal This article has been indexed from Silicon UK Read the original article: Virgin Media O2 To Offer Mobile Satellite Links In Rural Areas
CISA Alerts on Active Exploitation of VMware Tools and Aria Operations 0-Day
The Cybersecurity and Infrastructure Security Agency (CISA) has raised alarm over active exploitation of a critical privilege escalation vulnerability affecting Broadcom’s VMware Tools and VMware Aria Operations. Tracked as CVE-2025-41244, this 0-day flaw poses significant risk to organizations managing virtualized…