Chinese Cyber Threat IntelligenceHackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks bulwarkblack2 years ago01 mins Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks Scheduled Task Tampering Hackers-Modifying-Registry-Keys-to-Establish-Persistence-via-Scheduled-TasksDownload Post navigation Previous: Tackling Anti-Analysis Techniques of GuLoader and RedLine StealerNext: Prior to Cyber Attack, Russian Attackers Spent Months Inside the Ukraine Telecoms Giant
CL-STA-1087: Chinese APT Targets Southeast Asian Militaries with AppleChris and MemFun Backdoors acint2 weeks ago2 weeks ago 0
Operation TrueChaos: Chinese APT Exploits TrueConf Zero-Day CVE-2026-3502 to Target Southeast Asian Governments acint2 weeks ago 0
Chinese APT Red Menshen Plants Stealthy BPFdoor Backdoors in Global Telecom Networks acint3 weeks ago 0
Red Menshen Plants BPFdoor Backdoors in Global Telecom Networks for Long-Term Espionage acint3 weeks ago 0