The advanced persistent threat (APT) group Earth Koshchei, also known as APT29 or Midnight Blizzard, has launched a major cyberespionage campaign. Using a method called “rogue RDP,” the group sent spear-phishing emails containing a malicious Remote Desktop Protocol file which, when opened, tried to connect to rogue servers. Various entities including governments, military organizations, and researchers were targeted, primarily for espionage purposes. Experts say the campaign demonstrates how genuine cybersecurity tools can be used maliciously, highlighting the need for stronger defensive measures.

Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity
Witnesses at a House hearing on medical device cybersecurity highlighted the need for better tracking of devices and their vulnerability to cyber threats. They noted