Robuta

https://cyberscoop.com/radio/chinese-cyber-operations-and-their-implications-for-u-s-national-security/
Dec 4, 2025 - Chinese cyber operations and their implications for U.S. national security
breaking downthe latesterachinesecyberespionage
https://www.rferl.org/a/us-wikileaks-cia-leak-frankfurt-hub-cyberespionage/28357299.html
The U.S. Consulate in Frankfurt was the hub for U.S. cyberespionage in Europe, the Middle East, and Africa, according to some of the thousands of purported...
leakedciadocumentsshowfrankfurt
https://www.helpnetsecurity.com/2015/09/09/cyberespionage-group-exploits-satellites-for-ultimate-anonymity/
While investigating the infamous Russian-speaking cyberespionage actor Turla, Kaspersky Lab researchers have discovered that the group is evading
cyberespionagegroupexploitssatellitesultimate
https://www.bitdefender.com/en-gb/business/resource-library/companies-blame-competition-for-corporate-cyberespionage
companiesblamecompetitioncorporatecyberespionage
https://www.business-humanrights.org/en/latest-news/report-from-the-citizen-lab-finds-clients-of-cyberespionage-company-circles-include-govts-with-a-history-of-surveillance-abuses/
Check out this page via the Business and Human Rights Centre
citizen labreportfindsclientscyberespionage
https://brandefense.io/blog/apt37-group-2025/
Nov 22, 2025 - Discover the 2025 threat profile of APT37 (Famous Chollima), a DPRK-aligned espionage group using spear-phishing, cloud persistence, and advanced malware.
northactivecyberespionagegroup
https://www.csoonline.com/article/3844122/chinese-cyberespionage-group-deploys-custom-backdoors-on-juniper-routers.html
Mar 12, 2025 - The threat group UNC3886 uses stolen credentials and custom malware implants to compromise end-of-life routers from Juniper Networks still in use by...
chinesecyberespionagegroupdeployscustom
https://www.csoonline.com/article/575119/iran-cyberespionage-group-taps-simplehelp-for-persistence-on-victim-devices.html
May 2, 2025 - Group-IB researchers have also identified a previously unknown command and control infrastructure and a PowerShell script that APT group MuddyWater is using...
irancyberespionagegrouptapspersistence
https://www.eset.com/us/about/newsroom/press-releases/eset-research-uncovers-latest-version-of-gelsemium-cyberespionage-against-government-and-other-targ-4/
latest versionesetresearchgelsemiumcyberespionage
https://securityaffairs.com/184941/apt/badaudio-malware-how-apt24-scaled-its-cyberespionage-through-supply-chain-attacks.html
Nov 22, 2025 - APT24 used supply chain attacks and varied techniques to deploy the BadAudio malware in a long-running cyberespionage campaign.
supply chainmalwarescaledcyberespionage