Sunday, June 22, 2025

Agentforce London: Salesforce Reports 78% of UK Companies Embrace Agentic AI

WhatsApp Aims to Collaborate with Apple on Legal Challenge Against Home Office Encryption Directives

AI and the Creative Industries: A Misguided Decision by the UK Government

CityFibre Expands Business Ethernet Access Threefold

Fusion and AI: The Role of Private Sector Technology in Advancing ITER

Strengthening Retail: Strategies for UK Brands to Combat Cyber Breaches

Apple Encryption Debate: Should Law Enforcement Use Technical Capability Notices?

Sweden Receives Assistance in Strengthening Its Sovereign AI Capabilities

MPs to Explore Possibility of Government Digital Identity Program

Chinese spies exploit vulnerable home office equipment for cyber attacks.

An international alert issued by the Five Eyes allied cyber agencies revealed that the China-backed APT40 has been actively targeting new victims by exploiting vulnerabilities in small office and home office (SoHo) networking devices. These devices serve as a staging post for command and control (C2) activity during attacks.

The Australian Cyber Security Centre (ACSC) highlighted APT40’s repeated targeting of networks using compromised SoHo devices. These devices are considered easier targets for malicious actors compared to large enterprise equivalents due to being end-of-life or unpatched.

APT40 has also been known to use procured or leased infrastructure for victim-facing C2 activities, although this practice appears to be declining. The group’s tradecraft continues to evolve, with a focus on covert operations that challenge network defenders.

Despite efforts to remediate attacks, APT40 remains a notable threat with advanced capabilities and a history of targeting various sectors. To mitigate an APT40 intrusion, security teams are advised to maintain up-to-date logging, prompt patch management, and implement network segmentation. Other measures include disabling unnecessary network services, enforcing least privilege policies, and implementing multifactor authentication.