222 reports
Earth Lusca actors blend financial cybercrime with traditional espionage activities
Electronic Operations Room manages up to 60 groups targeting critical infrastructure across Middle East
Advanced 'Coruna' toolkit later adopted by cybercriminals targeting cryptocurrency users
FBI warns research institutions and government entities of mobile-focused attack bypassing email security
German authorities warn of sophisticated operation harvesting credentials from politicians and journalists
Operation Neusploit leverages CVE-2026-21509 vulnerability in coordinated campaign across Ukraine, Slovakia, and Romania
Espionage operation allegedly compromised sensitive information on 5,000 agents investigating Chinese dissidents
Advanced persistent threat group escalates operations against critical communications networks in Southeast Asia
Security service identifies cyberespionage as country's most significant digital threat
Custom malware tools targeted intelligence on military capabilities and Western defense partnerships
Handala group exploits Microsoft cloud platform to wipe 200,000 devices across 79 countries
Spear-phishing operation employs tactics resembling Sandworm Group methods
Parliamentary Assembly analysis highlights cyber risks, missile programs, and Tehran's support for Russia's Ukraine campaign
Operation Used Advanced Spyware to Monitor Political Opponents and Silence Dissenting Voices
Shadow Campaigns operation targeted law enforcement, border control, and financial agencies in global reconnaissance effort
MSS-linked hackers maintained years-long access to telecommunications infrastructure and law enforcement wiretapping systems
State-sponsored group GTG-1002 used Claude AI to autonomously conduct attacks against 30 organizations
Targets include GRU Unit 29155 operatives and cyber group Cadet Blizzard for destabilizing activities
Cyber espionage operations focus on aerospace, defense, and critical technology sectors across the region
IISS analysis documents intensified hybrid warfare campaign spanning seven critical sectors
Remote employees generate regime revenue while accessing sensitive corporate networks
CISA warns state-sponsored group targets government and private sector organizations to reach downstream victims
Multiple Tehran-linked cyber units target critical infrastructure to locate regime opponents abroad
Attack on judicial infrastructure highlights escalating cyber threats to democratic institutions
Palo Alto Networks identifies extensive espionage campaign targeting government agencies and financial institutions
Security researchers breach Pyongyang cyber unit's workstation, revealing espionage tools and cross-border intelligence sharing
Amnesty roundtable documents systematic transnational repression tactics targeting activists and community members
Analysis of 250,000 messages reveals state-orchestrated coordination rather than organic activism
Kimsuky group targeted South Korean diplomatic missions using cloud platforms for command and control operations
CrowdStrike analysis reveals sophisticated exploitation of trusted cloud relationships and rapid weaponization of vulnerabilities
Chinese state-sponsored group maintains persistent access since February through critical IOS XE vulnerabilities
Operation targeted South Korean diplomatic missions with sophisticated spear-phishing techniques
Attack targeted Office of Foreign Assets Control using stolen API keys and zero-day exploits
Credential theft and data leaks on Russian forums raise concerns about election security ahead of presidential vote
Citizen Lab investigation reveals sophisticated attack methods against diaspora advocacy group
Joint advisory reveals broad espionage operation targeting global telecommunications infrastructure
FBI warns of sophisticated credential theft campaign targeting think tanks and government entities
Sichuan Juxinhe Network Technology and Shanghai-based operator targeted for compromising US telecommunications infrastructure
Attack on Donald Tusk's systems reflects broader hybrid warfare tactics ahead of presidential vote
Chen Jinping admits to conspiracy charges in rare prosecution of transnational repression activities on US soil
Cyberattacks target ruling party systems as GRU operations reach unprecedented levels
Research Centre 227 deploys artificial intelligence for automated espionage and financial operations
AT&T and Verizon Among Major Carriers Compromised as Beijing Targets Political Leaders and Intelligence Systems
Seven new China-nexus adversary groups identified as financial services and media sectors face intensified targeting
Pioneer Kitten and Fox Kitten provide initial access to healthcare, education, and defense targets
MSS-linked hackers continue decade-long targeting of contractors and government officials
Intelligence agencies report escalating digital warfare targeting public sector infrastructure
Microsoft reveals state-backed groups leveraged OpenAI models to automate phishing campaigns
Breach demonstrates Pyongyang's sophisticated cyber capabilities against high-level officials
IRGC-linked Cyb3rAv3ngers group targets utilities using Israeli equipment across multiple states
Hackers combined website disruption with phishing campaign to harvest taxpayer credentials
YourAnonSpider breach reveals sensitive UAV tactical data amid broader hacktivist campaign
Telecommunications giant's repeated security failures expose critical infrastructure vulnerabilities
Custom remote access trojan demonstrates Moscow's information warfare expansion beyond Ukraine's borders
Sophisticated attackers accessed driver's licenses and passports in $76 million cyberattack
Federal agencies detail tactics used by Lazarus Group and allied units since 2020
NB65 collective leaks 786GB of internal data amid coordinated attacks on Moscow's media infrastructure
New phishing campaign extracts sensitive data as cyber warfare intensifies
IRGC-affiliated actors target critical sectors across Five Eyes nations through coordinated cyber operations
IRGC-linked Cotton Sandstorm group exfiltrates customer data following satirical content
Tehran-affiliated group deploys custom malware to compromise email systems across regional targets
FSB-linked hackers repurpose ANDROMEDA botnet domains to deploy targeted malware against Ukrainian entities
Threat actors demonstrate fluid transition between profit-driven attacks and state-sponsored intelligence gathering
Microsoft report reveals coordinated digital espionage campaign against governments and aid organizations
UNC3886 and UNC5221 operations demonstrate sustained espionage campaign targeting aerospace sector
GRU hackers impersonated Signal and WhatsApp to harvest battlefield coordinates from military devices
APT deploys living-off-the-land technique targeting defense contractor communications
Kimsuky group deployed spear-phishing campaigns while expanding into ransomware operations
US cybersecurity officials link ransomware attacks on public entities to Tehran-backed threat actors
Hackers target police systems and border control networks following July diplomatic expulsions
Unprecedented diplomatic response marks first time country has cut relations over cyber warfare
Viasat KA-SAT network disruption disabled Ukrainian communications and German wind farms on invasion day
FBI intelligence sharing led to immediate security measures for parliamentarians
Intelligence chiefs describe Beijing's activities as 'most game-changing challenge' facing Western security
FBI confirms Lazarus Group and APT38 conducted one of history's largest cryptocurrency heists through Axie Infinity breach
Sophisticated attack on ICRC systems compromised data of conflict-affected families worldwide
Federal indictment reveals Beijing's efforts to monitor congressional candidate and Tiananmen activist on U.S. soil
Unprecedented joint attribution names MSS as architect of global cyberattack affecting tens of thousands of servers
FireEye attributes sophisticated campaign targeting government and defense sectors across U.S. and Europe
Bureau offers $10 million reward for information on operatives who conducted voter intimidation campaign
Hackers compromise Initech to identify vulnerabilities in software protecting over 10 million computers
Attack compromised approximately 250,000 servers worldwide including thousands of U.S. organizations
Intelligence assessment reveals phishing operations against Ukrainian energy firm and Democratic organizations
Lazarus Group operatives targeted financial institutions and cryptocurrency exchanges across multiple countries
SVR-linked operation compromised nine federal agencies and 18,000 organizations worldwide
Critical transportation systems disrupted as European infrastructure faces heightened cyber threats
Eleven-year cyber campaign linked to China's Ministry of State Security stole hundreds of millions in intellectual property
Cyber attack intercepted pandemic communications as state managed public health crisis
Pioneer Kitten group gained access to results reporting system with potential to alter unofficial counts
Kimsuky group conducted months-long spear-phishing operation against pharmaceutical companies developing pandemic countermeasures
Russian, Chinese, and Iranian state-backed groups targeted political campaigns and election-related organizations in 2020
Cryptocurrency scam compromised 130 high-profile accounts including political leaders and tech executives
APT41-linked operatives targeted over 100 companies in supply chain attacks and ransomware operations
Canadian intelligence reports surge in espionage targeting proprietary vaccine and treatment data across Five Eyes nations
Intelligence services deployed advanced persistent threats against pharmaceutical companies and research institutions
Microsoft detected state-backed cyberattack on SKDKnickerbocker as part of broader election disruption efforts
Attack underscores Tehran's broader effort to steal Western pandemic research and treatment data
Pandemic creates unprecedented vulnerabilities in healthcare systems and remote work environments
SVR-linked attackers initiate sophisticated compromise that would later breach multiple US federal agencies
IRGC-linked hackers targeted Trump campaign officials and media figures through sophisticated spearphishing operations
Secret report details how Chinese intelligence services exploited telecommunications employees to access foreign systems
GRU hackers focused on Ukrainian energy company at center of political controversy
Sophisticated masquerading operation targeted government and industry across 35 countries
Attack compromises decades of personal and research data, highlighting vulnerabilities in academic cybersecurity
DOJ indictment reveals GRU operations persisted through May 2018 with dramatically expanded funding
Twelve defendants including MPS officials targeted dissidents and foreign governments through APT27 operations
Park Jin-hyok allegedly operated through Chinese front company in unprecedented cybercrime spree
Indictments detail Russian military intelligence operation targeting US election infrastructure
Breach Compromised Supersonic Anti-Ship Missile Plans and Submarine Cryptographic Systems
Attacks on media, telecommunications, and energy sectors demonstrated sustained interference beyond electoral periods
State-sponsored hackers target critical infrastructure through compromised remote access systems
Behzad Mesri allegedly stole Game of Thrones scripts while conducting broader cyber operations against US and Israeli targets
Cyber espionage operation exploited Microsoft vulnerabilities to steal documents via Google Drive
Fabricated news report spawned regional crisis and massive disinformation campaign
Officials warn Moscow gained extensive knowledge of American election infrastructure during 2016 operations
GRU-linked Fancy Bear releases massive data dump two days before voting, mixing authentic emails with fabricated documents
Reality Winner disclosed classified report revealing GRU cyber operations against U.S. voting systems
Classified analysis warns of Russian election interference ahead of 2017 federal vote
Cyber operations aimed to undermine American confidence in democratic institutions
WikiLeaks release of stolen DNC communications forces party leadership resignation on convention eve
Lazarus Group expands global banking offensive with malware similar to Sony Pictures breach
GRU operations continued targeting Democratic Party systems even after transferring files to WikiLeaks
2012 breach initially disclosed as 6.5 million accounts proves twenty times larger than reported
Mossack Fonseca data theft reveals systemic vulnerabilities in financial secrecy infrastructure
GRU hackers gained access to DNC servers months before public disclosure, setting stage for 2016 influence campaign
September 2015 alert about compromised computer fails to trigger immediate remediation
Cyberattack marks largest publicly disclosed healthcare data breach in US history
Federal security officials confirm blast furnace damage in rare example of cyber warfare crossing into physical realm
Eastern Naval Command systems compromised as virus harvested sensitive data for transmission to Chinese servers
GameOver Zeus network searched for government documents and intelligence personnel data alongside financial crimes
Defense officials contained the April attack within 24 hours as Moscow's cyber operations target US military systems
FBI charges nine individuals in largest known computer hacking and securities fraud scheme targeting confidential press releases
Junaid Hussain's death removes key figure behind Cyber Caliphate operations targeting Western infrastructure
Hacker group claims breach of diplomatic servers amid escalating regional conflict
Attack highlights persistent threats to critical energy systems in allied nations
Historic bilateral commitment follows years of Chinese intellectual property theft targeting U.S. companies
Password manager compromise highlights risks to government and corporate security systems
Attack on transcript services exposes vulnerabilities in critical federal tax infrastructure
AIVD penetrated Cozy Bear operations, capturing security camera footage of hackers targeting US systems
GRU hackers establish persistent access as part of broader election interference operation
Spear-phishing attack forced military's unclassified system offline for weeks while experts rebuilt compromised infrastructure
Impact Team hackers threatened to release adultery site data unless platform shut down permanently
Six-month operation traced to Hebei province represents systematic targeting of American industrial secrets
IRGC-linked phishing operations target opposition groups ahead of planned protests
APT28 attackers extracted 16 gigabytes of data from Bundestag systems in suspected election interference campaign
400GB data dump exposes spyware sales to authoritarian regimes across Africa and Middle East
AIVD penetration of Cozy Bear workspace provided unprecedented visibility into 2015 cyberattack
Intelligence chief publicly attributes OPM hack affecting millions of government employees
Sophisticated cyber espionage platform linked to Israeli Unit 8200 exploited zero-day vulnerabilities for intelligence gathering
Four million government employees affected in what officials call one of the largest federal data breaches in U.S. history
Fancy Bear hackers masked sophisticated cyberattack on TV5Monde as jihadist operation
Attack on OPM systems exposes sensitive records of 21.5 million federal employees and contractors
GRU-linked Cozy Bear maintained access to DNC systems for nearly a year through sophisticated spear phishing campaign
Jiangsu State Security Department-linked operation targets Office of Personnel Management through sophisticated backdoor malware
2014 cyber operation against Korea Hydro and Nuclear Power marked first targeting of civilian nuclear infrastructure
CyberBerkut infiltrators deleted key election files and fabricated results showing far-right victory before being detected
2014 intrusion forced complete IT infrastructure rebuild, costing hundreds of millions in damages
Cyber operation exfiltrated 2 terabytes of sensitive law enforcement data
Snake cyberweapon campaign targeted state agencies as tensions escalated toward annexation of Crimea
Systematic espionage operation targets government and defense systems to support military objectives
CyberBerkut group claims breach of Central Election Commission infrastructure in apparent disruption campaign
Oversight panel recommends dismantling metadata collection following Snowden revelations
District Court decision challenges legality of mass metadata collection exposed by intelligence contractor
Snowden revelations strain transatlantic relations as Berlin condemns American espionage operations
PLA Unit 61398 systematically targeted 141 organizations across 20 industries from 2006 to 2013
Snowden documents expose systematic overreach in warrantless collection of U.S. communications
IRGC-linked cyber intrusion accessed critical infrastructure SCADA systems at Bowman Avenue Dam
Four-month infiltration of New York Times systems coincided with reporting on Chinese leadership finances
PLA operations target critical infrastructure and intellectual property across Western telecommunications networks
Cybersecurity firm exposes PLA Unit 61398 as advanced persistent threat targeting Western corporations
DNI Clapper identifies foreign intelligence cyber operations as top menace for coming years
Anti-fraud demonstrations prompt Russian accusations of Western interference and surveillance expansion
Prisma monitoring system emerged as Moscow's response to Snow Revolution demonstrations
Landmark assessment warns of systematic theft costing American economy tens of billions annually
Intelligence-gathering virus targets nuclear facilities using Stuxnet-derived code
Classified documents reveal significant expansion of American cyber warfare capabilities
Sophisticated espionage operation steals proprietary oil and gas intelligence from 71 organizations
Group publishes fake health crisis news before exposing donor database containing thousands of records
Simple URL manipulation technique compromised 360,000 customer accounts despite elementary protective measures
Treasury Board, Finance, and Defence Research systems compromised in coordinated phishing campaign
Attack exposed fundamental security failures across Sony's digital infrastructure
Multi-month intrusion targeted confidential economic data through spear-phishing campaign
Anonymous splinter group demonstrates information warfare tactics against public broadcaster
Security firm admits March breach of two-factor authentication system facilitated subsequent defense contractor infiltration
Defense contractor suspends remote access for 100,000 employees following sophisticated authentication attack
Jinan-based attackers compromised hundreds of accounts including Cabinet-level official
Officials claim 'Stars' virus targeted nuclear facilities through espionage malware disguised as government files
Tehran admits sophisticated malware infiltrated uranium enrichment facilities at Natanz
Eighteen-minute incident redirected sensitive US government and military communications through Chinese servers
European telecommunications equipment facilitated regime monitoring of dissidents during 2009 protests
Regime implements comprehensive internet monitoring following 2009 election protests
Multi-year cyber espionage campaign compromises classified stealth fighter designs and systems
Cyber-spies left behind software programs capable of disrupting critical power systems
Sophisticated cyber espionage campaign targeted intellectual property and human rights activists' communications
Investigation reveals China-linked network infiltrated government offices and activist targets across 103 countries
Day.Az and ANS.az news agencies hit during 2008 conflict over regional coverage
Chinese-linked espionage network demonstrates advanced capabilities against diaspora communities and government institutions
Moscow's coordinated digital and kinetic operations establish new template for hybrid warfare
USB-delivered attack on classified systems sparks creation of US Cyber Command
Three-year cyber operation compromised research on satellites, drones, and robotics for military programs
Sophisticated cyber espionage operation targeted internal documents and sensitive correspondence during election season
Multi-year espionage operation linked to PLA Unit 61398 extracted sensitive defense data through 2007
Alliance defense ministers commit to action by autumn 2007 after unprecedented digital assault
Attack part of broader foreign intrusion campaign that compromised terabytes of federal data
Russian-linked attackers targeted government, banking, and media infrastructure in response to Bronze Soldier monument move
Space agency implemented emergency security measures after foreign intruders obtained launch vehicle plans
Attack forces two-week shutdown of military education facility as part of broader campaign against defense infrastructure
PLA Unit 61398 hackers targeted nuclear, metals, and solar companies to steal trade secrets for state enterprises
Titan Rain campaign attributed to PLA Unit 61398 targets sensitive U.S. and UK government systems
Mydoom, NetSky, and Bagle variants dominated internet traffic as cyber criminal factions escalated digital warfare
Agency auditors assess two-year-old program turning intelligence machinery inward
USA PATRIOT Act grants unprecedented monitoring powers with reduced judicial oversight
More than 20 listening devices discovered in plane built for Communist Party General Secretary Jiang Zemin
EP-3E crew detained for 11 days on Hainan Island as Beijing gained access to classified surveillance systems
Moonlight Maze espionage campaign demonstrates Moscow's persistent cyber capabilities against U.S. defense systems
Previously secret packet-sniffing program raises questions about domestic monitoring capabilities
Temporary committee established to examine allegations of mass surveillance and industrial espionage targeting European communications