Russia-Linked Laundry Bear Deploys DRILLAPP Backdoor Against Ukraine (2 minute read)
Russia-linked Laundry Bear targeted Ukrainian entities in February 2026 with a new DRILLAPP backdoor abusing Microsoft Edge debugging for stealth.
Russia-linked Laundry Bear targeted Ukrainian entities in February 2026 with a new DRILLAPP backdoor abusing Microsoft Edge debugging for stealth.
A China-linked state actor deployed custom malware against Asian militaries, staying dormant for months before acting.
A Russia-linked hacker group targeted Ukrainian organizations with fake Starlink and charity documents to install spyware. The campaign exploits trusted brands Ukrainians rely on during wartime.
The Lebanese government cannot shield its territory from Israeli operations or force Hezbollah to disarm amid U.S.-Iran tensions. Beirut is effectively paralyzed between competing armed actors.
Tehran's history of high-stakes brinkmanship has yielded concessions before, but analysts argue current U.S. resolve and regional dynamics make the strategy likely to fail.
A cyberattack disrupted parking payment infrastructure in the Russian city of Perm, which has since been restored.
Attackers hit medical tech giant Stryker's internal Microsoft environment, remotely wiping tens of thousands of employee devices with no malware deployed.
Just Security compiles expert analysis on the 2025-2026 US-Israel-Iran conflict covering nuclear diplomacy, regional security, and international law.
Three structural factors are entrenching Iran's security apparatus, making regime collapse increasingly unlikely despite ongoing conflict.
Beijing's non-interference approach leaves it dependent on unreliable partners like Iran with limited crisis utility. The Iran conflict exposes the strategic ceiling of China's partnership model.
The escalating Middle East conflict has placed Beijing in a position where any stance risks strategic costs. China's leverage is constrained by competing interests with all warring parties.
The Iran-Israel-US conflict highlights China's inability to project influence through allied proxies, unlike the US.
From Vietnam to Iran, U.S. presidents have sacrificed public trust by obscuring truth for national security aims. The pattern carries compounding long-term political costs.
Defense Secretary Hegseth called for 'no quarter, no mercy' against enemies amid the U.S.-Iran conflict. Legal experts warn such an order violates the laws of armed conflict.
Startups and VCs increasingly frame defense contracting as military-equivalent service, drawing criticism for equating profit-driven work with uniformed sacrifice.
Thailand's Constitutional Court will rule on whether QR codes on ballots in the February 8 election breached constitutional voter confidentiality protections.
Akamai reports cybercrime spiked 245% since the Iran war began, with hacktivists leveraging Russian and Chinese proxy services to hammer banks and critical businesses.
CISA added CVE-2025-47813, a Wing FTP Server info-disclosure flaw, to its KEV catalog after confirming active exploitation.
CISA catalogued CVE-2025-47813, a Wing FTP Server information disclosure vulnerability, citing active exploitation. Federal agencies face mandatory remediation under BOD 22-01.
A Booz Allen Hamilton report finds adversaries are weaponizing AI faster than governments and enterprises can respond, compressing defenders' reaction windows.