Chinese Cyber Threat IntelligenceHackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks bulwarkblack2 years ago01 mins Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks Scheduled Task Tampering Hackers-Modifying-Registry-Keys-to-Establish-Persistence-via-Scheduled-TasksDownload Post navigation Previous: Tackling Anti-Analysis Techniques of GuLoader and RedLine StealerNext: Prior to Cyber Attack, Russian Attackers Spent Months Inside the Ukraine Telecoms Giant
CL-STA-1087: Chinese APT Targets Southeast Asian Militaries with AppleChris and MemFun Backdoors acint1 month ago1 month ago 0
Operation TrueChaos: Chinese APT Exploits TrueConf Zero-Day CVE-2026-3502 to Target Southeast Asian Governments acint1 month ago 0
Chinese APT Red Menshen Plants Stealthy BPFdoor Backdoors in Global Telecom Networks acint2 months ago 0
Red Menshen Plants BPFdoor Backdoors in Global Telecom Networks for Long-Term Espionage acint2 months ago 0