Cybersecurity Chaos: When Your Systems Lie and Hackers Thrive

APT41 exploits Google Calendar for command-and-control, proving even hackers appreciate a well-organized schedule. Forget about “penciling in” a cyberattack—these state-sponsored actors are setting reminders for mayhem. Time to rethink your calendar invites, because your next meeting could be with TOUGHPROGRESS malware.

Pro Dashboard

Hot Take:

In the ever-evolving cat-and-mouse game of cybersecurity, it seems like the hackers have found a way to transform Google Calendar into their personal secret clubhouse. Meanwhile, defenders are stuck playing a high-stakes game of “Where’s Waldo?” with the alerts on their dashboards. If only they could set an alert to detect meaningful alerts!

Key Points:

  • APT41, a Chinese threat actor, uses Google Calendar for command-and-control (C2) operations.
  • Law enforcement takes down AvCheck[.]net, a platform facilitating undetectable malware.
  • Void Blizzard, a Kremlin-linked hacker group, targets Dutch police and other Western entities.
  • EDDIESTEALER, a new info-stealer bypassing Chrome’s encryption, emerges.
  • Australia mandates ransomware payment disclosure to curb cyber extortion.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?