Microsoft caught using Chinese engineers to maintain the US Department of Defense computer systems (with minimal supervision by U.S. personnel).

Microsoft caught using Chinese engineers to maintain the US Department of Defense computer systems (with minimal supervision by U.S. personnel).

In a development that has sparked significant scrutiny from lawmakers and national security experts, Microsoft has acknowledged employing engineers based in China to assist in maintaining cloud computing systems used by the U.S. Department of Defense (DoD). The revelation has raised serious questions about the oversight of critical military technologies and the adequacy of the federal government’s cybersecurity protocols.
Chinese state-backed threat actors target Taiwan’s semiconductor sector with Colbalt Strike and custom backdoors.

Chinese state-backed threat actors target Taiwan’s semiconductor sector with Colbalt Strike and custom backdoors.

Recent months have seen a significant escalation in cyber espionage campaigns targeting Taiwan’s vital semiconductor industry, attributed to Chinese state-backed threat actors. These sophisticated operations, reported from March through June 2025 and potentially ongoing, are believed to be aimed at acquiring proprietary technology, disrupting business operations, and gathering sector intelligence. The uptick in attacks aligns with China’s strategic drive for semiconductor self-sufficiency amid increasingly restrictive export controls imposed by the United States and its allies.
Researchers dissect mobile forensics tool, Massistant, which is used by Chinese law enforcement to extract data from smartphones.

Researchers dissect mobile forensics tool, Massistant, which is used by Chinese law enforcement to extract data from smartphones.

Recent research has shed light on Massistant, a sophisticated mobile forensics application reportedly employed by Chinese law enforcement agencies to extract extensive digital data from mobile devices. Developed by Meiya Pico—now operating as SDIC Intelligence Xiamen Information Co., Ltd.—Massistant represents the latest evolution in China’s state-operated mobile surveillance capabilities.
Computer hacker in front of a Chinese flag

China’s Tencent is trying to shut down online archives of content censored from WeChat.

Tencent, the technology conglomerate behind China’s ubiquitous WeChat platform, is facing criticism from digital rights advocates after allegedly pressuring the shutdown of FreeWeChat.com—a prominent online archive dedicated to preserving content censored from WeChat. The incident has sparked debate about the use of legal tactics to suppress independent documentation of digital censorship in China.
Initial Access Brokers are deploying patches to exploited vulnerabilities to effectively lock out rival cybercriminals.

Initial Access Brokers are deploying patches to exploited vulnerabilities to effectively lock out rival cybercriminals.

A recent cyber campaign has brought to light a sophisticated new tactic employed by initial access brokers, believed to be linked to China. These threat actors are leveraging zero-day vulnerabilities in Ivanti Connect Secure systems to infiltrate target networks. Uniquely, after gaining access, the attackers are applying their own patches to the exploited vulnerabilities, effectively locking out both defenders and rival cybercriminals.