It's an example of the potentially insidious nature of open-source supply chain compromises.
Between cloud computing and other IT services, NTT Communications has a wealth of data for hackers to aim at.
Was Israel behind a hack on an Iranian port? “Maybe and maybe not,” says Yigal Unna.
More than just a “loader” that delivers malicious code, Valak can also be used to siphon off data from enterprise networks.
It's a blow to Huawei’s efforts to shield Meng Wanzhou from the U.S. justice system.
Investigators earlier this year uncovered evidence of the hackers’ “longstanding compromises” at unnamed companies, according to a confidential memo.