threatactor

04
Dec
Iran’s MuddyWater Intensifies Espionage: Advanced Toolset Hits Israel and Egypt

Iran’s MuddyWater Intensifies Espionage: Advanced Toolset Hits Israel and Egypt

December 2, 2025 MuddyWater, one of Iran’s most persistent intelligence-aligned threat groups, is expanding its espionage activity with a
3 min read
26
Nov
Iranian APT-Enabled Missile Doctrine

Iranian APT-Enabled Missile Doctrine

November 20, 2025 Iran’s integration of cyber capabilities into missile operations marks a pivotal shift in hybrid warfare doctrine.
3 min read
25
Nov
Exploiting the Oracle Gap: Unpacking the Cl0p Breach at The Washington Post

Exploiting the Oracle Gap: Unpacking the Cl0p Breach at The Washington Post

November 16, 2025 The cyberattack against The Washington Post marks a significant escalation in the ongoing wave of large-scale data
5 min read
24
Nov
Iran’s Expanding Cyber Espionage Program: The SmudgedSerpent Campaign Against U.S. Think Tanks and Academics

Iran’s Expanding Cyber Espionage Program: The SmudgedSerpent Campaign Against U.S. Think Tanks and Academics

November 22, 2025 Iran’s cyber espionage apparatus has entered a new phase of strategic maturity, marked by increasingly sophisticated
5 min read
24
Nov
Australia’s Expanding Cyber Battlespace: Regional Pressures, Authoritarian Threats, and the Strategic Risks of AI Adoption

Australia’s Expanding Cyber Battlespace: Regional Pressures, Authoritarian Threats, and the Strategic Risks of AI Adoption

November 21, 2025 Australia is entering one of the most complex phases of its digital and geopolitical evolution. In a
5 min read
20
Nov
Cyber Shockwave: The Jaguar Land Rover Attack and Its Economic Reverberations

Cyber Shockwave: The Jaguar Land Rover Attack and Its Economic Reverberations

November 20, 2025 The cyberattack on Jaguar Land Rover in September 2025 was not just a corporate crisis—it became
3 min read
19
Nov
North Korea’s KONNI Cluster Weaponizes Google’s Find My Device: A New Phase in DPRK Android Targeting

North Korea’s KONNI Cluster Weaponizes Google’s Find My Device: A New Phase in DPRK Android Targeting

November 18, 2025 North Korean operators from the KONNI activity cluster—affiliated with Kimsuky and APT37—have begun exploiting Google’
4 min read
19
Nov
UNC1549: A Middle Eastern Cyber-Espionage Campaign Targeting Global Aerospace and Defense

UNC1549: A Middle Eastern Cyber-Espionage Campaign Targeting Global Aerospace and Defense

November 18, 2025 The UNC1549 operation uncovered by Mandiant goes far beyond a routine cyber incident. It illustrates how modern
4 min read
19
Nov
Everest Ransomware Group: Evolution, Modus Operandi, and Major Operations

Everest Ransomware Group: Evolution, Modus Operandi, and Major Operations

November 17, 2025 Since emerging in late 2020, the Everest ransomware group has evolved into a multifaceted and persistent cyber-extortion
4 min read
19
Nov
DDoSia Targets Denmark: A Clear Look at the Threat

DDoSia Targets Denmark: A Clear Look at the Threat

November 17, 2025 Denmark has recently experienced a major DDoS attack by a group named DDoSia, disrupting various critical online
1 min read