Skip to content
Thursday, January 15, 2026

Cyberbytes Daily

Your one stop for cybersecurity news

  • Home

China-Backed Threat Actor ‘UNC5174’ Using Open Source Tools in Stealthy Attacks

Posted on April 15, 2025
China-Backed Threat Actor ‘UNC5174’ Using Open Source Tools in Stealthy Attacks

Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar.

​The original article found on darkreading Read More

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
Posted in Cyber Security News

Post navigation

Previous: Are We Prioritizing the Wrong Security Metrics?
Next: Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

Related Posts

‘Dark LLMs’ Aid Petty Criminals, But Underwhelm Technically
  • Cyber Security News

‘Dark LLMs’ Aid Petty Criminals, But Underwhelm Technically

  • cyberbytes
  • November 26, 2025
  • 0

As in the wider world, AI is not quite living up to the hype in the cyber underground. But it’s definitely helping low-level cybercriminals do […]

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
Hackers Allegedly Leak HSBC USA Customer and Financial Information
  • Cyber Security News

Hackers Allegedly Leak HSBC USA Customer and Financial Information

  • cyberbytes
  • October 29, 2025
  • 0

A threat actor has claimed responsibility for breaching HSBC USA, the American division of the global investment bank and financial services holding company. The cybercriminal […]

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
  • Cyber Security News

TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions

  • cyberbytes
  • July 9, 2025
  • 0

A new Android vulnerability called TapTrap that allows malicious apps to bypass the operating system’s permission system without requiring any special permissions themselves. The attack […]

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Like this:

Like Loading...
Copyright © 2026 Cyberbytes Daily Theme: Press News By Adore Themes.
%d