China’s Cyberspying Targets Western Defense Industry, Dutch Intel Chief Says
The Wall Street Journal
www.wsj.com/world/chinas...
@wsj.com
Posts by 780th Military Intelligence Brigade (Cyber)
New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses
ANY.RUN
any.run/cybersecurit...
Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories
Void Dokkaebi, also tracked as Famous Chollima, is a North Korea-aligned intrusion set
Trend Micro
www.trendmicro.com/en_us/resear...
Same packet, different magic: Mustang Panda hits India's banking sector and Korea geopolitics
Acronis Threat Research Unit
www.acronis.com/en/tru/posts...
EU targets two Russian propaganda networks with new sanctions
The Record
therecord.media/eu-targets-r...
@therecordmedia.bsky.social
Ukraine busts ‘bot farm’ supplying thousands of fake Telegram accounts to Russian spies
The Record
therecord.media/ukraine-sbu-...
@therecordmedia.bsky.social
Initial Takeaways on LayerZero DVN Security Incident
Security Alliance
radar.securityalliance.org/initial-take...
KelpDAO suffers $290 million heist tied to Lazarus hackers
BleepingComputer
www.bleepingcomputer.com/news/securit...
@bleepingcomputer.com
GoLoader at Industrial Scale: Two Unauthenticated Builder Panels, 468K Polymorphic Samples, Steganographic .NET Loaders, and a Cracked njRAT Config Pointing to a Chinese XWorm Operator
Breakglass Intelligence
intel.breakglass.tech/post/goloade...
Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)
Unit 42 | Palo Alto
unit42.paloaltonetworks.com/iranian-cybe...
From APT28 to RePythonNET: automating .NET malware analysis
Sekoia.io
blog.sekoia.io/apt28-to-rep...
@sekoia.io
Microsoft Threat Intelligence uncovered a macOS‑focused cyber campaign by the North Korean threat actor Sapphire Sleet that relies on social engineering
www.microsoft.com/en-us/securi...
Iranian APT Seedworm Targets Global Organizations via Microsoft Teams
CyberProof
www.cyberproof.com/blog/iranian...
MOIS Linked MOIST GRASSHOPPER / Homeland Justice / KarmaBelow80 / Handala Hackers / Campaigns and Evolution
Domain Tools
dti.domaintools.com/research/moi...
@domaintools.bsky.social
How North Korea laundered money through Vietnamese crypto company
The Korea Times
www.koreatimes.co.kr/foreignaffai...
Inside ZionSiphon: Darktrace’s Analysis of OT Malware Targeting Israeli Water Systems
Darktrace
www.darktrace.com/blog/inside-...
@darktrace.com
China Criticizes Iran War as Beijing Supports Tehran Under the Table
Foundation for Defense of Democracies
www.fdd.org/analysis/202...
The Risks of Chinese-Produced Cellular Modules
Foundation for Defense of Democracies
www.fdd.org/analysis/202...
The Iran War’s Hidden Front: Censorship, Satellite Imagery, and Narrative Power
Homeland Security Today
www.hstoday.us/subject-matt...
Two U.S. nationals have been sent to prison for helping North Korean remote information technology (IT) workers to pose as U.S. residents
BleepingComputer
www.bleepingcomputer.com/news/securit...
Two U.S. nationals have been sent to prison for helping North Korean remote information technology (IT) workers to pose as U.S. residents
BleepingComputer
www.bleepingcomputer.com/news/securit...
Intelligence Specialist (Operations) GG-13 w/ the 782nd Military Intelligence Battalion (Cyber), Fort Gordon, Ga., serving as a Cryptologic Cyberspace Operations Specialist, as a Digital Network Exploitation Analyst (DNEA). Open: April 16 to 22, 2026, www.usajobs.gov/job/865250400. #ArmyCyber
How China’s Weapons Transfers to Iran Have Evolved Over Decades
The New York Times
www.nytimes.com/2026/04/15/w...
@nytimes.com
Sweden Sees Russia Intensifying Cyber Attacks on Infrastructure
Bloomberg
www.bloomberg.com/news/article...
@bloomberg.com
How a fake Russian story became a real problem for Estonia
Politico
www.politico.eu/article/how-...
@politico.eu
Hungary for more? Russian Storm-1516 narratives and engagement tactics targeting Hungary’s 2026 parliamentary election
Clemson University
open.clemson.edu/cgi/viewcont...
Orbán’s loss won’t stop Russian influence campaigns, but it shows they’re beatable
Defense One
www.defenseone.com/threats/2026...
@defenseone.bsky.social
State-sponsored threats: Different objectives, similar access paths
Across the Talos 2025 Year in Review, state-sponsored threat activity from China, Russia, North Korea, and Iran all had varying motivations
Cisco Talos
blog.talosintelligence.com/state-sponso...
"And particularly, two brands of these devices, TP-Link, which is a Chinese firm, and MikroTik, which is a Latvian firm, which is not very popular here in the United States but is very widely used in Eastern Europe and particularly in Ukraine."