China’s APT40 targets new vulnerabilities and can abuse them within hours

Chinese state-sponsored threat actors, tracked by Western cybersecurity agencies as APT40, work fast. They hunt for previously undisclosed vulnerabilities, quickly build exploits, and rush to deploy them as soon as possible.

In some instances, the entire process, from vulnerability discovery to exploitation, only lasted a couple of hours.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top