Operations & Campaigns
Explore documented attack campaigns, coordinated threat actor operations, and the geopolitical dynamics behind them.
-
Aeternum C2 Botnet Abuses Polygon Blockchain to Hide Malware Commands and Evade Takedowns
Security researchers have uncovered a new botnet loader called Aeternum C2 that stores encrypted command-and-control instructions on the Polygon blockchain, making traditional takedown efforts significantly harder and signaling a new…
·
·
4–6 minutes -
UAT-10027 Targets U.S. Healthcare with Dohdoor Malware Using DoH C2
Researchers have uncovered a previously undocumented cyber campaign tracked as UAT-10027 targeting U.S. healthcare and education organizations with a new backdoor called Dohdoor that uses DNS-over-HTTPS to evade detection and…
·
·
4–6 minutes -
CyberStrikeAI: Chinese-Linked AI Attack Platform Compromises 600+ FortiGate Devices Across 55 Countries
An open-source AI-native offensive security tool called CyberStrikeAI, developed by a Chinese coder with ties to the Ministry of State Security, has been deployed by a Russian-speaking threat actor to…
·
·
12–18 minutes -
Cyber & Electronic Warfare · Cyber News & Updates · Digital Espionage & Intelligence · IranRevolution2026 · Operations & Campaigns
Iranian Revolution 2026: Complete Intelligence Briefing — Protests, War, Cyber Operations, and the Fall of Khamenei
Comprehensive intelligence briefing on the Iranian Revolution of 2026 — from the December 2025 protest eruption and regime massacres, through Operation Epic Fury and Operation Roaring Lion, the assassination of…
·
·
31–46 minutes -
Critical Ivanti Vulnerability Exploited Since Last Summer in Attacks
Critical Ivanti EPMM vulnerability actively exploited since last summer.
·
·
2–3 minutes -
D-Knife Spyware: China-Linked APT Hijacks Routers for Cyber Espionage
Unveiling the D-Knife spyware campaign, a sophisticated China-linked APT operation hijacking internet routers for persistent surveillance and data exfiltration. Discover its techni
·
·
1–2 minutes -
China-Linked UNC3886 Cyber Espionage Targets Singapore Telecom
China-linked APT UNC3886’s sophisticated cyber espionage against Singapore’s telecom sector highlights evolving nation-state threats to critical infrastructure, demanding executive
·
·
2–3 minutes -
Russia’s Claimed Capture of Pokrovsk Comes at a Steep Cost
Russia has claimed control of Pokrovsk, a crucial logistical hub in eastern Ukraine, after a prolonged and costly battle. Ukraine denies a full capture, as both sides report significant casualties…
·
·
2–3 minutes -
Putin Says He’s Open to Discussing Trump’s Peace Plan But Warns Ukraine Faces Defeat
Russian President Vladimir Putin has indicated he might be open to certain elements of a U.S. peace plan for Ukraine. However, he warned that Russian forces would continue their advance…
·
·
2–3 minutes -
Poland picks Saab’s A26 submarine design, contract eyed by year’s end
Poland’s Ministry of National Defense has selected Sweden’s Saab A26 Blekinge design for its new submarine fleet, aiming to procure three submarines under the Orka program with a contract expected…
·
·
2–3 minutes








