CybersecuritySecurity

Suspected Chinese Cyber Espionage Group Targets European Telecom Infrastructure

Security analysts have identified what appears to be a sophisticated cyberespionage operation against a European telecommunications provider. The suspected Chinese-linked Salt Typhoon group exploited Citrix vulnerabilities to deploy backdoors and maintain stealthy network access according to recent findings.

European Telecommunications Provider Targeted in Sophisticated Cyberattack

Security researchers at Darktrace have identified what they assess to be a cyberespionage operation against a European telecommunications firm, with evidence pointing to the China-linked threat actor known as Salt Typhoon. According to their report, the intrusion occurred in early July 2025 and involved the exploitation of vulnerable Citrix NetScaler Gateway appliances to gain initial network access.

CybersecuritySoftware

Microsoft Neutralizes 200+ Fraudulent Certificates in Teams Malware Campaign

Microsoft has disrupted a major malware campaign using fraudulent certificates to sign fake Teams installers. The threat actor deployed backdoors and ransomware through spoofed download sites targeting unsuspecting users. Security experts warn this represents an escalation in cybercriminal tactics.

Major Certificate Revocation Operation

Microsoft Threat Intelligence has reportedly revoked more than 200 certificates that were fraudulently signed by threat actors and used in fake Microsoft Teams setup files to deliver backdoors and malware. According to reports, the campaign was identified in late September and involved sophisticated social engineering techniques to compromise users.