Operations & Campaigns
Explore documented attack campaigns, coordinated threat actor operations, and the geopolitical dynamics behind them.
-

Russia Detains Eight in Bashkortostan Over Alleged Telecom Sabotage Plot
Russian authorities have detained eight individuals in the republic of Bashkortostan, alleging their involvement in a plot to sabotage telecommunications infrastructure. The detentions signal a heightened focus on internal security amidst ongoing international tensions.
-

Russia Enacts New Reservist Law Amid Ukraine War, Sparking ‘Hidden Mobilization’ Concerns
A new Russian law allowing reservist call-ups for ‘special training’ amid the Ukraine war has sparked concerns of a ‘hidden mobilization’ to bolster forces, though its impact remains debated.
-

Ukrainian Drones Strike Russian Industrial Facilities
Ukrainian drones struck an industrial complex in Russia’s central republic of Bashkortostan and a power substation in the Kursk region, according to statements from regional authorities. The incidents mark a continuation of cross-border attacks targeting critical infrastructure.
-

Cybercriminals Exploit Legitimate Remote Tools to Target Logistics Networks
Cybercriminals are increasingly targeting the logistics and freight industry by exploiting legitimate Remote Monitoring and Management (RMM) tools to gain unauthorized access, with the ultimate goal of stealing cargo.
-

The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
Security Operations Centers (SOCs) are struggling to keep pace with the volume of daily alerts, often dedicating significant time to false positives and reactive adjustments to detection rules. A lack of environmental context and relevant threat intelligence hampers analysts’ ability to efficiently verify malicious alerts, leading to excessive manual triage of benign notifications. Addressing the…
-

North Korean Actors Target Web3, New Side-Channel Attacks Exploit Intel/AMD TEEs
North Korean Actors Target Web3, New Side-Channel Attacks Exploit Intel/AMD TEEs
-

TruffleNet Infrastructure Abuses AWS for Large-Scale Financial Fraud
An attacker infrastructure named TruffleNet is using stolen credentials and open-source tools to systematically compromise AWS environments, abusing the AWS Simple Email Service (SES) for Business Email Compromise (BEC) attacks and financial fraud.
-

Drone Attack Targets Saratov Oil Refinery in Russia
Ukraine’s General Staff claimed responsibility for a drone attack on the Saratov Oil Refinery in Russia, marking the fourth such incident this autumn. Russia reported intercepting numerous drones over the region.
-

Ukrainian Specialists Positively Evaluate ‘Ai-Petri’ EW Complex for Enhanced Defense
Ukrainian specialists have given a positive preliminary evaluation to the ‘Ai-Petri’ electronic warfare (EW) complex, highlighting its potential to boost defensive capabilities against drones like Shahed types. The system is designed to disrupt enemy reconnaissance and protect critical infrastructure by jamming navigation systems, with significant investment from former President Petro Poroshenko supporting its deployment across…
-

Ukrainian Commander Forewarns of Potential Energy Disruptions in Russia
Ukrainian Commander Robert ‘Мадяр’ Brovdi states that Ukrainian Defense Forces are planning attacks on Russian territory that could lead to electricity outages, signaling an evolving strategy to disrupt Russian infrastructure and compel adaptation among its populace.
