40 reports
Shadow Campaigns operation targeted law enforcement, border control, and financial agencies in global reconnaissance effort
MSS-linked hackers maintained years-long access to telecommunications infrastructure and law enforcement wiretapping systems
Chinese hackers target additional networks including US providers through Cisco router vulnerabilities
CISA warns state-sponsored group targets government and private sector organizations to reach downstream victims
Chinese state-sponsored group maintains persistent access since February through critical IOS XE vulnerabilities
Joint advisory reveals broad espionage operation targeting global telecommunications infrastructure
AT&T and Verizon Among Major Carriers Compromised as Beijing Targets Political Leaders and Intelligence Systems
Seven new China-nexus adversary groups identified as financial services and media sectors face intensified targeting
Diamond Sleet and Onyx Sleet groups deploy malware through software development infrastructure
Volt Typhoon group uses stealth tactics to position for potential disruption operations
UNC3886 and UNC5221 operations demonstrate sustained espionage campaign targeting aerospace sector
Sophisticated attack on ICRC systems compromised data of conflict-affected families worldwide
Attack compromised approximately 250,000 servers worldwide including thousands of U.S. organizations
SVR-linked operation compromised nine federal agencies and 18,000 organizations worldwide
Russian, Chinese, and Iranian state-backed groups targeted political campaigns and election-related organizations in 2020
Intelligence services deployed advanced persistent threats against pharmaceutical companies and research institutions
SVR-linked attackers initiate sophisticated compromise that would later breach multiple US federal agencies
Secret report details how Chinese intelligence services exploited telecommunications employees to access foreign systems
DOJ indictment reveals GRU operations persisted through May 2018 with dramatically expanded funding
Twelve defendants including MPS officials targeted dissidents and foreign governments through APT27 operations
State-sponsored hackers target critical infrastructure through compromised remote access systems
GRU operations continued targeting Democratic Party systems even after transferring files to WikiLeaks
September 2015 alert about compromised computer fails to trigger immediate remediation
GameOver Zeus network searched for government documents and intelligence personnel data alongside financial crimes
Defense officials contained the April attack within 24 hours as Moscow's cyber operations target US military systems
AIVD penetrated Cozy Bear operations, capturing security camera footage of hackers targeting US systems
GRU hackers establish persistent access as part of broader election interference operation
Six-month operation traced to Hebei province represents systematic targeting of American industrial secrets
AIVD penetration of Cozy Bear workspace provided unprecedented visibility into 2015 cyberattack
Sophisticated cyber espionage platform linked to Israeli Unit 8200 exploited zero-day vulnerabilities for intelligence gathering
Four million government employees affected in what officials call one of the largest federal data breaches in U.S. history
Attack on OPM systems exposes sensitive records of 21.5 million federal employees and contractors
GRU-linked Cozy Bear maintained access to DNC systems for nearly a year through sophisticated spear phishing campaign
Jiangsu State Security Department-linked operation targets Office of Personnel Management through sophisticated backdoor malware
CyberBerkut infiltrators deleted key election files and fabricated results showing far-right victory before being detected
2014 intrusion forced complete IT infrastructure rebuild, costing hundreds of millions in damages
Snake cyberweapon campaign targeted state agencies as tensions escalated toward annexation of Crimea