55 reports
Operation Neusploit leverages CVE-2026-21509 vulnerability in coordinated campaign across Ukraine, Slovakia, and Romania
Custom malware tools targeted intelligence on military capabilities and Western defense partnerships
Operation Used Advanced Spyware to Monitor Political Opponents and Silence Dissenting Voices
Cybersecurity researchers expose attacks targeting water and fuel systems with data theft capabilities
CISA warns state-sponsored group targets government and private sector organizations to reach downstream victims
Lazarus Group's sophisticated attack on Dubai-based platform marks largest crypto theft in history
FBI warns of sophisticated impersonation tactics designed to steal digital assets and fund weapons programs
Diamond Sleet and Onyx Sleet groups deploy malware through software development infrastructure
Operation demonstrates coordination between Pyongyang's cyber units and evolving deception tactics
Custom remote access trojan demonstrates Moscow's information warfare expansion beyond Ukraine's borders
Destructive cyberattack mirrors 2017 NotPetya tactics as precursor to military action
Federal agencies detail tactics used by Lazarus Group and allied units since 2020
New phishing campaign extracts sensitive data as cyber warfare intensifies
Tehran-affiliated group deploys custom malware to compromise email systems across regional targets
FSB-linked hackers repurpose ANDROMEDA botnet domains to deploy targeted malware against Ukrainian entities
UNC3886 and UNC5221 operations demonstrate sustained espionage campaign targeting aerospace sector
APT deploys living-off-the-land technique targeting defense contractor communications
Hackers compromise Initech to identify vulnerabilities in software protecting over 10 million computers
SVR-linked operation compromised nine federal agencies and 18,000 organizations worldwide
SVR-linked attackers initiate sophisticated compromise that would later breach multiple US federal agencies
US Attribution Links Pyongyang to 2017 Cyber Operation That Crippled Hospitals and Critical Systems Worldwide
Cyber espionage operation exploited Microsoft vulnerabilities to steal documents via Google Drive
GRU operation causes $10 billion in global damages while devastating Ukraine's digital infrastructure
Lazarus Group expands global banking offensive with malware similar to Sony Pictures breach
Sandworm group's sophisticated operation left 230,000 consumers without electricity for hours
Eastern Naval Command systems compromised as virus harvested sensitive data for transmission to Chinese servers
Solihull resident publicly celebrated successful disruption of official sites on social media
GameOver Zeus network searched for government documents and intelligence personnel data alongside financial crimes
CTB-Locker family drives sharp increase in financially-motivated cyber operations with potential state-sponsored applications
Sophisticated cyber espionage platform linked to Israeli Unit 8200 exploited zero-day vulnerabilities for intelligence gathering
Jiangsu State Security Department-linked operation targets Office of Personnel Management through sophisticated backdoor malware
CyberBerkut infiltrators deleted key election files and fabricated results showing far-right victory before being detected
Snake cyberweapon campaign targeted state agencies as tensions escalated toward annexation of Crimea
MSS operative Yanjun Xu recruited insiders to plant malware targeting Western aviation secrets
PLA Unit 61398 systematically targeted 141 organizations across 20 industries from 2006 to 2013
Shamoon malware campaign marks escalation in Middle East cyber warfare targeting critical energy infrastructure
Intelligence-gathering virus targets nuclear facilities using Stuxnet-derived code
Treasury Board, Finance, and Defence Research systems compromised in coordinated phishing campaign
Officials claim 'Stars' virus targeted nuclear facilities through espionage malware disguised as government files
Sophisticated malware targeted industrial control systems at reactor site despite official denials of operational impact
Tehran admits sophisticated malware infiltrated uranium enrichment facilities at Natanz
DDoS attacks mark early phase of Pyongyang's systematic cyber warfare capabilities development
Cyber-spies left behind software programs capable of disrupting critical power systems
US-Israeli operation against Iranian nuclear facilities demonstrated unprecedented cyber-physical attack capabilities
Chinese-linked espionage network demonstrates advanced capabilities against diaspora communities and government institutions
USB-delivered attack on classified systems sparks creation of US Cyber Command
2007 formation marks Pyongyang's entry into organized state-sponsored hacking operations
Stuxnet malware development begins in 2005 under Operation Olympic Games framework
NetSky, Mydoom, and Bagle variants dominated global malicious traffic in coordinated deletion campaigns
Mydoom, NetSky, and Bagle variants dominated internet traffic as cyber criminal factions escalated digital warfare
Critical safety monitoring systems went offline for five hours during malware incident