Digital Espionage & Intelligence
Coverage of cyber espionage, intelligence operations, surveillance technologies, information theft, counterintelligence trends, and geopolitical motivations driving covert digital campaigns between nation-states and advanced threat groups.
-

Researchers Uncover Lazarus APT’s Remote-Worker Infiltration Scheme
In a significant breakthrough, a joint investigation has revealed North Korea’s Lazarus Group, specifically its Famous Chollima division, is actively infiltrating global companies. The APT group is posing as remote IT workers to breach organizations, primarily targeting the finance, crypto, healthcare, and engineering sectors. This investigation serves as a critical warning to companies and hiring…
-

Japan Scrambles Jets to Intercept Chinese Spy Drone
Japan scrambled fighter jets on Monday after a presumed Chinese unmanned aircraft traversed the airspace between Yonaguni Island and Taiwan, prompting an emergency response. This incident follows a growing pattern of Chinese military aircraft activity near Japan, highlighting escalating tensions and the increasing presence of sophisticated unmanned aerial vehicles in the region.
-

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
A new report highlights a concerning trend with China’s DeepSeek-R1 AI model. Research shows it generates code with significant security vulnerabilities when prompted with politically sensitive topics. Cybersecurity firm CrowdStrike found that the likelihood of insecure code increases by up to 50% for topics the Chinese Communist Party considers sensitive, introducing new risks in AI-driven…
-

SpearSpecter — Iranian-linked APT42 uses WhatsApp lures and PowerShell backdoor
INDA analysis shows APT42’s SpearSpecter uses WhatsApp lures and a modular PowerShell backdoor that targets officials and family members; detection steps and IOCs are included in the report.
-

GTG-1002: AI-assisted espionage campaign abused an AI coding tool
A campaign tracked as GTG-1002 used an AI coding tool to automate reconnaissance, vulnerability validation, and exploit generation against roughly 30 organizations. The attackers relied on commodity tools rather than bespoke malware, making detection possible with standard defenses. Defenders should gate high‑risk actions, verify AI outputs, and prioritize patching.
-

Defense Marketing: Information Leakage & National Security
This article discusses the paradox of defense marketing, where emerging defense companies, in their pursuit of market position and investment, inadvertently leak sensitive information, compromising national security and strategic deterrence.
-

What is CitrixBleed 2 (CVE-2025-5777)?
CitrixBleed 2 (CVE-2025-5777) is a critical information-disclosure vulnerability impacting NetScaler ADC and Gateway systems, allowing unauthorized attackers to bypass MFA, hijack admin sessions, and establish unauthorized VDE sessions. This zero-day was exploited by an unnamed APT group before a patch was released.
-

CitrixBleed: Critical Flaw Leads to Session Hijacking and MFA Bypass
CitrixBleed is a critical information-disclosure vulnerability affecting Citrix NetScaler ADC and Gateway systems. Attackers exploit this flaw to steal session tokens, hijack user sessions, and bypass multi-factor authentication, leading to data breaches, system compromise, and digital espionage by APT groups and cybercriminals.