Custom illustration showing a hacker silhouette controlling cloud-service icons (OneDrive, Yandex Cloud) overlaying an IT supply chain network diagram.

APT31 Targets Russian IT via Yandex Cloud & OneDrive C2

Between 2024 and 2025, China-linked APT31 conducted a stealthy espionage campaign targeting Russian IT contractors and government integrators. The group masked its command-and-control using legitimate cloud services such as Yandex Cloud and OneDrive, deployed loaders like CloudyLoader via DLL side-loading, and maintained long dwell times within compromised networks. This article decodes APT31’s tool-kit, tactics and persistence model, and offers detection and response guidance for defenders.

Read More

Japan’s Cybersecurity Shortcomings Exposed!! Rising Threats, Weak Defenses

Japan is facing a cybersecurity crisis. A government review revealed hundreds of security incidents in 2024 alone, exposing systemic weaknesses across critical infrastructure. While Tokyo has introduced new laws to expand its defensive capabilities, experts warn that outdated systems and poor planning leave the nation vulnerable to both cybercriminals and nation-state hackers Scale of the…

Read More
AI inference vulnerabilities in Meta, Nvidia, Microsoft and vLLM exposed through ShadowMQ, alongside a Cursor IDE compromise via rogue MCP servers

Serious AI Bugs Expose Meta, Nvidia and Microsoft Inference

Researchers uncovered serious AI bugs across Meta, Nvidia, Microsoft and open-source inference frameworks after tracking a ShadowMQ deserialization pattern built on ZeroMQ and Python pickle. At the same time, new research shows how Cursor’s AI IDE can be hijacked via rogue MCP servers, turning developer workstations into high-value malware delivery platforms if teams ignore AI supply-chain security.

Read More
BGP upstream map highlighting AS30823 (aurologic) feeding multiple high-risk hosting ASNs across Europe

Sanctions vs. Transit: Aeza’s Reliance on aurologic Connectivity

aurologic GmbH (AS30823) operates a multi-terabit backbone out of Langen and connects multiple high-risk hosting providers including sanction-linked entities—giving malware C2 and staging servers durable reach. This analysis explains why upstream neutrality often translates into enablement, how TAEs cluster under aurologic, and what blue teams can do: upstream-aware detections, deny-by-default on risky cones, flowspec/RTBH during incidents, and procurement levers that force faster de-peering.

Read More