China-linked actors hide attacks behind botnets of compromised home devices. Cyber defense grows more complex.
Almost every China-aligned threat actor is involved.
A massive DDoS network of 13.5-million devices has been used to launch a 2Tbps attack on an unnamed target for 40 minutes ...
Hackers working for the Chinese government are increasingly hiding their attacks behind ready-made networks of hacked routers ...
International cyber agencies are sounding the alarm that China-nexus hackers have quietly pivoted to a new playbook, turning ...
China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk, ...
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability ...
A SystemBC proxy malware botnet of more than 1,570 hosts, believed to be corporate victims, has been discovered following an ...
A Mirai botnet has started exploiting CVE-2025-29635, a year-old command injection vulnerability in discontinued D-Link ...
PowMix targets Czech workforce since Dec 2025 using jittered C2 and ZIP phishing, enabling stealthy remote access and ...
Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
Cyber criminals are exploiting IoT devices in homes to create a botnet called BADBOX 2.0, enabling illegal online activities. Most compromised devices are manufactured in China and become infected ...