Sunday, April 20, 2025

UK Class Action Paves the Way for Showdown with Google

CVE Foundation Commits to Ongoing Operations Following Mitre Funding Reduction

I’m Here to Assist: The Rise of Tech Bros in a Technocratic World

Kraft Group Partners with NWN for Network Enhancements for the New England Patriots

Collaboration: The Key Defense Against Nation-State Threats

Tariff Turmoil Is Increasing Supply Chain Security Risks

Footballers Protest Against the Use of Performance Data Processing

CISA Last-Minute Extension of Mitre CVE Contract

Nvidia H20 Exports to China Restricted by AI Chip Regulations

Chinese spies exploit vulnerable home office equipment for cyber attacks.

An international alert issued by the Five Eyes allied cyber agencies revealed that the China-backed APT40 has been actively targeting new victims by exploiting vulnerabilities in small office and home office (SoHo) networking devices. These devices serve as a staging post for command and control (C2) activity during attacks.

The Australian Cyber Security Centre (ACSC) highlighted APT40’s repeated targeting of networks using compromised SoHo devices. These devices are considered easier targets for malicious actors compared to large enterprise equivalents due to being end-of-life or unpatched.

APT40 has also been known to use procured or leased infrastructure for victim-facing C2 activities, although this practice appears to be declining. The group’s tradecraft continues to evolve, with a focus on covert operations that challenge network defenders.

Despite efforts to remediate attacks, APT40 remains a notable threat with advanced capabilities and a history of targeting various sectors. To mitigate an APT40 intrusion, security teams are advised to maintain up-to-date logging, prompt patch management, and implement network segmentation. Other measures include disabling unnecessary network services, enforcing least privilege policies, and implementing multifactor authentication.