Chainshorts
Security

UK warns of Chinese hackers using proxy networks to evade detection

UK warns of Chinese hackers using proxy networks to evade detection

The UK’s National Cyber Security Centre (NCSC-UK) and international partners warned that Chinese hackers are increasingly using large-scale proxy networks of hijacked consumer devices to evade detection. This tactic allows them to disguise malicious activities, complicating efforts to track and prevent cyberattacks. The warning highlights ongoing concerns about state-sponsored cyber threats and the need for enhanced cybersecurity measures.

Read to earn +1
Share on XShare on Telegram

More in Security

Security

US-Iran standoff intensifies with ship seizures in Strait of Hormuz

Tensions between the US and Iran escalated in April 2026, with Iran seizing ships in the Strait of Hormuz, raising security concerns. The incident threatens regional stability and could impact global oil markets. The ongoing standoff highlights the increasing risks in the area, with potential implications for international trade and security.

Crypto BriefingApr 23source ↗
Security

Microsoft: Some Teams users can’t join meetings after Edge update

Microsoft confirmed a bug introduced by a recent Edge browser update that prevents some Windows users from joining Teams meetings. The company is working on a fix, and affected users are advised to use alternative browsers or update to a beta version of Edge. The issue impacts productivity for users relying on Teams for collaboration.

BleepingComputerApr 23source ↗
Security

US military running Bitcoin node to test national security applications, admiral tells Congress

The U.S. military is running a Bitcoin node to explore its potential for national security applications, Adm. Paparo told Congress. This move indicates increased interest in blockchain technology for defense and security purposes, highlighting Bitcoin's growing role beyond finance. The test aims to assess how Bitcoin's protocol can support secure, decentralized communication and data verification in government operations.

The BlockApr 23source ↗
All Security