The China-linked threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology (IT) supply chain as a means to obtain initial access to corporate networks.
That’s according to new findings from the Microsoft Threat Intelligence team, which said the Silk Typhoon (formerly Hafnium) hacking

- March 5, 2025
- by Francis Schmuff
- Cyber News
- Less than a minute
- 18 Views
Related Post
- by Francis Schmuff
- April 9, 2025
How to Leak to a Journalist
Neiman Lab has some good advice on how to leak a story to a journalist.
- by Francis Schmuff
- April 9, 2025
Explosive Growth of Non-Human Identities Creating Massive Security
GitGuardian’s State of Secrets Sprawl report for 2025 reveals the alarming scale of secrets exposure in modern software environments. Driving
- by Francis Schmuff
- April 9, 2025
Lovable AI Found Most Vulnerable to VibeScamming —
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating full-stack web applications using text-based prompts, has been
- by Francis Schmuff
- April 9, 2025
New TCESB Malware Found in Active Attacks Exploiting
A Chinese-affiliated threat actor known for its cyber-attacks in Asia has been observed exploiting a security flaw in security software
- by Francis Schmuff
- April 9, 2025
How to Leak to a Journalist
Neiman Lab has some good advice on how to leak a story to a journalist.
- by Francis Schmuff
- April 9, 2025
Explosive Growth of Non-Human Identities Creating Massive Security
GitGuardian’s State of Secrets Sprawl report for 2025 reveals the alarming scale of secrets exposure in modern software environments. Driving
- by Francis Schmuff
- April 9, 2025
Lovable AI Found Most Vulnerable to VibeScamming —
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating full-stack web applications using text-based prompts, has been
- by Francis Schmuff
- April 9, 2025
New TCESB Malware Found in Active Attacks Exploiting
A Chinese-affiliated threat actor known for its cyber-attacks in Asia has been observed exploiting a security flaw in security software