Orbán’s spies were hunting me, says Hungarian journalist accused of espionage

Szabolcs Panyi tells POLITICO that Budapest’s accusations are “meant to psychologically pressure me and shatter my credibility,” in the wake of his reporting on secret talks between Péter Szijjártó and Sergey Lavrov.

POLITICO
MEPs told to leave phone at home for China trip

Concerns over cyberespionage have peaked in recent years as authorities uncovered more attacks by Chinese state-backed hacking groups on European governments.

POLITICO

📰 China-Linked 'Red Menshen' APT Creates 'Digital Sleeper Cells' in Telecoms with BPFDoor

🇨🇳 China-linked APT 'Red Menshen' is planting stealthy BPFDoor backdoors in global telecom networks. The malware creates 'digital sleeper cells' for long-term espionage. 📡 #APT #BPFDoor #CyberEspionage

🔗 https://cyber.netsecops.io/articles/china-linked-apt-red-menshen-deploys-bpfdoor-in-global-telecom-networks/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

China-Linked 'Red Menshen' APT Creates 'Digital Sleeper Cells' in Telecoms with BPFDoor

A China-linked APT group, Red Menshen, is targeting telecommunications providers in the Middle East and Asia with a stealthy Linux backdoor called BPFDoor for long-term espionage.

CyberNetSec.io

Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government

Unit 42 researchers uncovered a series of cyberespionage campaigns targeting a Southeast Asian government organization between June and August 2025. Three distinct activity clusters were identified: Stately Taurus, CL-STA-1048, and CL-STA-1049. Stately Taurus used USB-propagated malware to deploy the PUBLOAD backdoor. CL-STA-1048 employed an espionage toolkit including EggStremeFuel backdoor, Masol RAT, and other tools. CL-STA-1049 utilized a novel Hypnosis loader to deploy FluffyGh0st RAT. These clusters show significant overlap with known China-aligned campaigns, suggesting a coordinated effort to establish persistent access and exfiltrate sensitive data from government networks. The convergence of multiple threat actors indicates a complex, well-resourced operation with a common strategic objective.

Pulse ID: 69c5e4ddc46bf7f11bc53115
Pulse Link: https://otx.alienvault.com/pulse/69c5e4ddc46bf7f11bc53115
Pulse Author: AlienVault
Created: 2026-03-27 02:01:01

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Asia #BackDoor #China #CyberSecurity #Cyberespionage #Espionage #Government #InfoSec #Malware #OTX #OpenThreatExchange #PUBLOAD #RAT #RCE #StatelyTaurus #Taurus #USB #Unit42 #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Boggy Serpens Threat Assessment

The Iranian threat group Boggy Serpens, linked to the Ministry of Intelligence and Security, has refined its cyberespionage tactics to focus on trusted relationship compromises and multi-wave targeting of strategic organizations. The group combines social engineering with AI-enhanced malware for long-term persistence, primarily targeting diplomatic and critical infrastructure sectors. Recent campaigns show increased technological capabilities, including AI-generated code and Rust-based tools. Boggy Serpens exploits hijacked accounts to bypass security measures and employs a secondary social engineering prompt to deliver malware. The group's determination is exemplified by a sustained four-wave campaign against a UAE marine and energy company, demonstrating its focus on infiltrating regional maritime infrastructure.

Pulse ID: 69b91b4202446dd5143da7c3
Pulse Link: https://otx.alienvault.com/pulse/69b91b4202446dd5143da7c3
Pulse Author: AlienVault
Created: 2026-03-17 09:13:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Cyberespionage #Espionage #ICS #InfoSec #Iran #Malware #OTX #OpenThreatExchange #RAT #Rust #SocialEngineering #UAE #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Infostealer infection exposed a DPRK-linked cyber operation.
Key findings:
• Polyfill.io supply-chain attack linked to actor
• Infiltration of crypto exchange Gate.us
• Crypto laundering via Telegram bots
• Espionage targeting Japan’s NIMS
Follow TechNadu for cybersecurity threat intelligence updates.

Source: https://www.hudsonrock.com/blog/6262

#InfoSec #ThreatIntel #CyberEspionage #SupplyChainAttack

iPhones and iPads Approved for NATO Classified Data

Apple announcement:
…iPhone and iPad are the first and only consumer devices in compliance with the infor... https://www.schneier.com/blog/archives/2026/03/iphones-and-ipads-approved-for-nato-classified-data.html

#cyberespionage #dataprotection #Uncategorized #smartphones #iPhone #Apple #iPad

iPhones and iPads Approved for NATO Classified Data - Schneier on Security

Apple announcement: …iPhone and iPad are the first and only consumer devices in compliance with the information assurance requirements of NATO nations. This enables iPhone and iPad to be used with classified information up to the NATO restricted level without requiring special software or settings—a level of government certification no other consumer mobile device has met. This is out of the box, no modifications required. Boing Boing post.

Schneier on Security

Iran’s MOIS-linked cybercrime operations highlight how state actors blur lines between espionage, crime, and disruption. In cyberspace, attribution and intent rarely come clean. 🕵️‍♂️⚠️ #NationState #CyberEspionage

https://www.theregister.com/2026/03/10/cybercrime_iran_mois/

Cybercrime isn't just a cover for Iran's government goons - it's a key part of their operations

: Ransomware, malware-as-a-service, infostealers benefit MOIS, too

The Register
Russian hackers target officials via WhatsApp and Signal

Cyber spies are posing as a fake Signal support chatbot to gain access to government officials’ messages.

POLITICO