State-Sponsored Operations
251 article(s)
🗓 07 Apr 2026 · 👤 AGONY · 🌍 Europe
APT28’s FrostArmada campaign turned everyday home and office routers into global espionage tools, hijacking DNS traffic and stealing sensitive credentials from thousands of organizations worldwide.
🗓 07 Apr 2026 · 👤 AGONY · 🌍 Middle-East
Iran’s integration of Russian cybercriminals into its offensive operations marks a new era in cyber warfare. By leveraging pseudo-ransomware tactics and blurring the lines between crime and state action, Tehran is making cyber threats harder to trace and counter, signaling a major escalation in the global digital conflict.
🗓 07 Apr 2026 · 👤 AGONY · 🌍 Europe
British intelligence has exposed a Russian cyber unit’s campaign to hijack home and small business routers, rerouting internet traffic for espionage. The NCSC urges urgent action to secure vulnerable devices.
🗓 07 Apr 2026 · 👤 AGONY · 🌍 Asia
North Korean threat actors have turned GitHub—a trusted developer platform—into a covert control center for a multi-stage phishing campaign targeting South Korean companies. By disguising malicious LNK files as PDFs and blending their activity with legitimate encrypted traffic, the attackers evaded detection and demonstrated a new era of stealthy cyber espionage.
🗓 06 Apr 2026 · 👤 AGONY · 🌍 Asia
North Korea’s cyber program now relies on modular, disposable malware built for parallel missions—espionage, financial theft, and disruption. This resilient strategy thwarts traditional defenses and demands a new approach from global security teams.
🗓 06 Apr 2026 · 👤 AGONY · 🌍 Asia
Kimsuky has revamped its attack strategy, deploying cleverly disguised shortcut files and advanced Python malware to bypass security systems and conduct stealthy cyber-espionage. Learn how this North Korean group’s new tactics work and why they’re so hard to detect.
🗓 03 Apr 2026 · 👤 AGONY · 🌍 Asia
North Korean state-backed hackers have adopted new tactics, using GitHub and Windows tools to spy on South Korean companies, evading traditional defenses with sophisticated social engineering and cloud-based data theft.
🗓 03 Apr 2026 · 👤 AGONY · 🌍 Middle-East
TA416, a pro-Chinese cyber-espionage group, has renewed attacks on European and Middle Eastern diplomatic targets, exploiting geopolitical tensions with sophisticated digital tactics. Learn how these stealthy hackers operate and what their resurgence means for global cybersecurity.
🗓 03 Apr 2026 · 👤 AGONY · 🌍 Asia
North Korean hackers orchestrated a $280 million heist on Drift Protocol by seizing its Security Council powers, exposing critical weaknesses in DeFi governance and shaking the crypto industry.
🗓 02 Apr 2026 · 👤 AGONY · 🌍 Middle-East
Israeli intelligence reportedly transformed Tehran’s state surveillance cameras into a digital spy grid, tracking high-value targets and exposing the vulnerabilities of civilian tech in modern cyberwarfare.
1  
2  
3  
4  
5  
Next »