China-nexus Threat Actor Targets Persian Gulf Region With PlugX
Zscaler
www.zscaler.com/blogs/securi...
@zscalerinc.bsky.social
Russia and China in the Gray Zone
Two short videos from the Joint Special Operations University outline the growing importance of the “Gray Zone” in modern strategic competition.
Small Wars Journal
smallwarsjournal.com/2026/03/12/r...
The Kremlin’s Cognitive Assault on Europe
Small Wars Journal
This article examines Russia’s use of cognitive warfare to target Europe’s populace to disrupt Western aid to Ukraine.
smallwarsjournal.com/2026/03/13/t...
Iran Supreme Leader Mojtaba Khamenei has verified account on X, Elon Musk’s platform
CNBC
www.cnbc.com/2026/03/12/i...
@cnbc.com
Handala Hack is an online persona operated by Void Manticore (aka Red Sandstorm, Banished Kitten), an actor affiliated with Iranian Ministry of Intelligence and Security (MOIS)
Check Point Research
research.checkpoint.com/2026/handala...
Despite initial hacktivist-aligned messaging, the Handala group is currently assessed by the threat intelligence community to be a state-directed front for Iran’s Ministry of Intelligence and Security (MOIS).
Unit 42 | Palo Alto
unit42.paloaltonetworks.com/handala-hack...
"Muddying the waters further, several pro-Russian hacktivist groups have now apparently joined the fray in support of Iran" @esetofficial.bsky.social
Within hours of the US-Israel ‘Operation Epic Fury’, Iran-nexus cyber-actors mobilized in large numbers – Palo Alto Networks' @Unit42_Intel counted more than 60 active pro-Iranian hacktivist groups.
ESET
www.welivesecurity.com/en/business-...
@esetofficial.bsky.social
Among the activities of APT groups in February 2026, attacks by APT28, Lotus Blossom, TA-RedAnt (APT37), UAT-8616, UNC3886, and UNC6201 were particularly prominent.
ASEC
asec.ahnlab.com/en/92906/
Treasury Sanctions Facilitators of DPRK IT Worker Fraud Targeting U.S. Businesses
U.S. Department of Treasury
home.treasury.gov/news/press-r...
Note: BG Matthew Lennox commanded the 780th MI BDE from July 2, 2020, to June 28, 2022.
Cyber National Mission Force to get new commander amid broader leadership turnover
The Record
therecord.media/cyber-nation...
@therecordmedia.bsky.social
APT Profile – Earth Lusca
Earth Lusca (aka FishMonger) is a China-linked threat actor active since 2019
Cyfirma
www.cyfirma.com/research/apt...
Iran’s Cyber Playbook in the Escalating Regional Conflict
Rapid7 Labs
www.rapid7.com/blog/post/tr...
@rapid7.com
National Security Overview 2026
Finish Security and Intelligence Service
supo.fi/en/overview
Finnish intelligence warns of persistent cyber espionage from Russia, China
The Record | Recorded Future
therecord.media/finnish-inte...
@therecordmedia.bsky.social
Sednit reloaded: Back in the trenches
The Sednit group – also known as APT28, Fancy Bear, Forest Blizzard, or Sofacy – has been operating since at least 2004.
ESET
www.welivesecurity.com/en/eset-rese...
@esetofficial.bsky.social
From Wagner to GRU, Russian Military Men Are Manning Moscow’s Shadow Fleet
The Organized Crime and Corruption Reporting Project
www.occrp.org/en/investiga...
@occrp.org
China-Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions
Check Point Software
blog.checkpoint.com/research/chi...
Russia targets Signal and WhatsApp accounts in cyber campaign
General Intelligence and Security Service | Netherlands
english.aivd.nl/latest/news/...
This blog highlights observations from North Korean remote IT worker activity tracked by Microsoft Threat Intelligence as Jasper Sleet and Coral Sleet
Microsoft Threat Intelligence
www.microsoft.com/en-us/securi...
TL;DR: Huntress has identified and detailed a full timeline of an intrusion in a customer environment that aligns with what others have identified as MuddyWater (Iranian-linked APT).
Huntress
www.huntress.com/blog/muddywa...
@huntress.com
UAT-9244 targets South American telecommunication providers with three new malware implants
Cisco Talos assesses UAT-9244, with high confidence, is a China-nexus APT actor closely associated with Famous Sparrow.
Cisco Talos
blog.talosintelligence.com/uat-9244/
People’s Republic of China (PRC)-nexus cyber espionage groups continue to dominate traditional state-sponsored espionage zero-day exploitation.
Google Threat Intelligence Group
cloud.google.com/blog/topics/...
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
Check Point Research
research.checkpoint.com/2026/interpl...
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company
Symantec
www.security.com/threat-intel...
Exposing a Russian Campaign Targeting Ukraine Using
New Malware Duo: BadPaw and MeowMeow
Clearsky
www.clearskysec.com/wp-content/u...
Russian hackers deploy new malware in phishing campaign targeting Ukraine
The Record | Recorded Future
therecord.media/russian-ukra...
@therecordmedia.bsky.social
Silver Dragon Targets Organizations in Southeast Asia and Europe
Silver Dragon, an APT group, is likely operating within the umbrella of Chinese-nexus APT41.
Check Point Research
research.checkpoint.com/2026/silver-...
In January 2026, Zscaler ThreatLabz observed activity by a suspected Iran-nexus threat actor targeting government officials in Iraq.
www.zscaler.com/blogs/securi...
@zscalerinc.bsky.social