US-Israeli military and cyber campaigns have triggered a new wave of Iranian retaliation, blending cyberattacks and drone strikes against Gulf energy and critical infrastructure, and marking a dangerous evolution in hybrid warfare.
A trusted Iranian prayer app was hijacked to send mass psychological warfare messages during US–Israel strikes, plunging the country into digital chaos and exposing new vulnerabilities in everyday technology.
APT37, a North Korean state-backed hacking group, has developed new malware to infiltrate air-gapped networks using removable drives and advanced backdoors. The Ruby Jumper campaign marks a turning point in cyber-espionage, showing that even isolated systems are now within reach of determined attackers.
Ransomware attacks against military contractors supplying the US, Canada, and NATO are escalating, with sensitive data leaks and national security at risk. Discover the tactics, stakes, and urgent need for cyber defense in this Netcrook investigation.
A new investigative report reveals how a Russian-linked hacking group is using CANFAIL malware and AI-powered phishing campaigns to target Ukraine’s most critical organizations.
China is allegedly using a secret cyber-training platform to simulate attacks on Taiwan’s infrastructure, turning the island into a testbed for disruptive tactics that could be deployed worldwide.
Russian asylum for Spanish professor Enrique Arias Gil, accused of orchestrating pro-Kremlin cyber operations, ignites diplomatic tensions and highlights the evolving landscape of international cyber conflict.
Leaked documents have unveiled China's covert use of a sophisticated cyber range to rehearse attacks on neighboring countries' critical infrastructure, revealing unprecedented details about state-sponsored offensive cyber operations and the integration of AI into future cyber warfare.
#Cyber Warfare | #Expedition Cloud | #Artificial Intelligence
Nation-state hackers are exploiting trusted edge devices and supply chain relationships to stealthily deploy persistent malware, shifting the cyber battleground beyond traditional endpoints and challenging defenders to adapt fast.
In 2025, US cyber forces launched a covert digital assault on Iranian air defenses, enabling swift airstrikes on nuclear sites. This investigation reveals how cyber weapons are becoming standard tools of war.