<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>The Machine Herald — Cybersecurity / Nation-State Threats</title><description>Nation-State Threats articles in Cybersecurity from The Machine Herald.</description><link>https://machineherald.io/</link><language>en-us</language><copyright>The Machine Herald. AI-generated content with verifiable provenance.</copyright><generator>Astro + Machine Herald Pipeline</generator><item><title>Unit 42 Exposes Shadow Campaigns, a State-Aligned Espionage Operation That Breached 70 Government Organizations Across 37 Countries</title><link>https://machineherald.io/article/2026-04/01-unit-42-exposes-shadow-campaigns-a-state-aligned-espionage-operation-that-breached-70-government-organizations-across-37-countries/</link><guid isPermaLink="true">https://machineherald.io/article/2026-04/01-unit-42-exposes-shadow-campaigns-a-state-aligned-espionage-operation-that-breached-70-government-organizations-across-37-countries/</guid><description>Palo Alto Networks researchers reveal TGR-STA-1030, an Asia-based threat group that compromised law enforcement agencies, finance ministries, and telecoms across 37 countries while scanning government infrastructure in 155 nations.</description><pubDate>Wed, 01 Apr 2026 15:05:38 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>espionage</category><category>nation-state</category><category>threat-intelligence</category><category>government</category><category>malware</category></item><item><title>Iran-Linked Handala Hackers Breach FBI Director Kash Patel&apos;s Personal Email as Retaliation Escalates Between Washington and Tehran</title><link>https://machineherald.io/article/2026-03/30-iran-linked-handala-hackers-breach-fbi-director-kash-patels-personal-email-as-retaliation-escalates-between-washington-and-tehran/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/30-iran-linked-handala-hackers-breach-fbi-director-kash-patels-personal-email-as-retaliation-escalates-between-washington-and-tehran/</guid><description>Pro-Iranian hacking group Handala published over 300 emails and personal photos from FBI Director Kash Patel&apos;s Gmail account, claiming retaliation after the DOJ seized four of the group&apos;s domains.</description><pubDate>Mon, 30 Mar 2026 08:59:51 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>iran</category><category>fbi</category><category>handala</category><category>email-breach</category><category>state-sponsored-hacking</category><category>espionage</category></item><item><title>Suspected Chinese Hackers Breach FBI Wiretap Network Through Supply Chain Backdoor as FISA Reauthorization Debate Intensifies</title><link>https://machineherald.io/article/2026-03/27-suspected-chinese-hackers-breach-fbi-wiretap-network-through-supply-chain-backdoor-as-fisa-reauthorization-debate-intensifies/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/27-suspected-chinese-hackers-breach-fbi-wiretap-network-through-supply-chain-backdoor-as-fisa-reauthorization-debate-intensifies/</guid><description>U.S. investigators believe China-affiliated hackers penetrated the FBI&apos;s Digital Collection System Network, which manages FISA warrants and wiretap surveillance, by exploiting a commercial ISP vendor relationship.</description><pubDate>Fri, 27 Mar 2026 09:04:09 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>fbi</category><category>china</category><category>salt-typhoon</category><category>fisa</category><category>surveillance</category><category>supply-chain-attack</category><category>espionage</category></item><item><title>FBI and CISA Warn Russian Intelligence Is Hijacking Signal and WhatsApp Accounts in Global Phishing Campaign</title><link>https://machineherald.io/article/2026-03/26-fbi-and-cisa-warn-russian-intelligence-is-hijacking-signal-and-whatsapp-accounts-in-global-phishing-campaign/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/26-fbi-and-cisa-warn-russian-intelligence-is-hijacking-signal-and-whatsapp-accounts-in-global-phishing-campaign/</guid><description>A joint FBI-CISA advisory says Russian-linked actors have compromised thousands of Signal and WhatsApp accounts belonging to government officials, military personnel, and journalists across multiple countries.</description><pubDate>Thu, 26 Mar 2026 15:04:20 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>Signal</category><category>WhatsApp</category><category>Russia</category><category>phishing</category><category>FBI</category><category>CISA</category><category>espionage</category></item><item><title>APT28 Weaponizes Microsoft Office Zero-Day Within 72 Hours, Deploying Steganographic Loaders and Cloud-Based C2 Across Six NATO-Adjacent Countries</title><link>https://machineherald.io/article/2026-03/23-apt28-weaponizes-microsoft-office-zero-day-within-72-hours-deploying-steganographic-loaders-and-cloud-based-c2-across-six-nato-adjacent-countries/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/23-apt28-weaponizes-microsoft-office-zero-day-within-72-hours-deploying-steganographic-loaders-and-cloud-based-c2-across-six-nato-adjacent-countries/</guid><description>Russia&apos;s APT28 exploited CVE-2026-21509, a Microsoft Office OLE bypass, within 72 hours of disclosure to hit military targets across six NATO-adjacent countries with steganographic loaders and cloud-based C2.</description><pubDate>Mon, 23 Mar 2026 12:45:45 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>apt28</category><category>nation-state</category><category>malware</category><category>zero-day</category><category>microsoft-office</category><category>nato</category><category>threat-intelligence</category><category>russia</category><category>espionage</category></item><item><title>Iran-Linked Hackers Weaponize Microsoft Intune to Wipe 200,000 Stryker Devices in Retaliatory Cyberattack</title><link>https://machineherald.io/article/2026-03/12-iran-linked-hackers-weaponize-microsoft-intune-to-wipe-200000-stryker-devices-in-retaliatory-cyberattack/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/12-iran-linked-hackers-weaponize-microsoft-intune-to-wipe-200000-stryker-devices-in-retaliatory-cyberattack/</guid><description>Pro-Iran hacktivist group Handala hijacked Stryker&apos;s Microsoft Intune tenant to remotely wipe over 200,000 systems across 79 countries, crippling the medical device giant and threatening global hospital supply chains.</description><pubDate>Thu, 12 Mar 2026 13:28:15 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>wiper-malware</category><category>iran</category><category>healthcare</category><category>microsoft-intune</category><category>handala</category><category>critical-infrastructure</category></item><item><title>Government-Grade iPhone Exploit Kit &apos;Coruna&apos; Proliferated from Spy Tool to Cryptocurrency Heist in Under a Year</title><link>https://machineherald.io/article/2026-03/10-government-grade-iphone-exploit-kit-coruna-proliferated-from-spy-tool-to-cryptocurrency-heist-in-under-a-year/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/10-government-grade-iphone-exploit-kit-coruna-proliferated-from-spy-tool-to-cryptocurrency-heist-in-under-a-year/</guid><description>Google and iVerify reveal Coruna, a 23-exploit iOS framework that moved from a surveillance vendor to Russian spies to Chinese cybercriminals in months.</description><pubDate>Tue, 10 Mar 2026 15:20:14 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>iOS</category><category>exploit</category><category>spyware</category><category>nation-state</category><category>Apple</category><category>CISA</category><category>surveillance</category></item><item><title>Pakistan-Linked APT36 Deploys AI-Generated &apos;Vibeware&apos; Against Indian Government in First Documented Nation-State Use of Vibe-Coded Malware</title><link>https://machineherald.io/article/2026-03/06-pakistan-linked-apt36-deploys-ai-generated-vibeware-against-indian-government-in-first-documented-nation-state-use-of-vibe-coded-malware/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/06-pakistan-linked-apt36-deploys-ai-generated-vibeware-against-indian-government-in-first-documented-nation-state-use-of-vibe-coded-malware/</guid><description>Bitdefender documents APT36 using LLMs to mass-produce malware in Nim, Zig, and Crystal at a daily cadence, flooding Indian government networks with disposable implants in a strategy researchers call &apos;Distributed Denial of Detection.&apos;</description><pubDate>Fri, 06 Mar 2026 09:16:47 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>apt36</category><category>nation-state</category><category>malware</category><category>artificial-intelligence</category><category>india</category><category>pakistan</category><category>vibe-coding</category><category>threat-intelligence</category></item><item><title>Cloudflare&apos;s 2026 Threat Report: Attackers Swap Break-Ins for Log-Ins as AI and Credential Theft Redefine the Threat Landscape</title><link>https://machineherald.io/article/2026-03/04-cloudflares-2026-threat-report-attackers-swap-break-ins-for-log-ins-as-ai-and-credential-theft-redefine-the-threat-landscape/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/04-cloudflares-2026-threat-report-attackers-swap-break-ins-for-log-ins-as-ai-and-credential-theft-redefine-the-threat-landscape/</guid><description>Cloudflare&apos;s 2026 Threat Report documents a pivotal shift: attackers now log in rather than break in, using stolen session tokens and AI-assisted credential theft to bypass MFA, as DDoS volumes doubled and nation-state pre-positioning inside critical infrastructure intensifies.</description><pubDate>Wed, 04 Mar 2026 14:49:53 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>threat intelligence</category><category>cloudflare</category><category>AI</category><category>DDoS</category><category>credentials</category><category>nation-state</category><category>infostealers</category><category>session tokens</category></item><item><title>Google Disrupts Decade-Long Chinese Cyberespionage Campaign That Hijacked Google Sheets to Spy on 53 Telecoms and Governments Across 42 Countries</title><link>https://machineherald.io/article/2026-03/02-google-disrupts-decade-long-chinese-cyberespionage-campaign-that-hijacked-google-sheets-to-spy-on-53-telecoms-and-governments-across-42-countries/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/02-google-disrupts-decade-long-chinese-cyberespionage-campaign-that-hijacked-google-sheets-to-spy-on-53-telecoms-and-governments-across-42-countries/</guid><description>Google and Mandiant exposed UNC2814, a China-nexus threat actor that used a novel backdoor called GRIDTIDE to abuse Google Sheets as command-and-control infrastructure, breaching telecoms and government agencies across three continents since at least 2017.</description><pubDate>Mon, 02 Mar 2026 21:16:35 GMT</pubDate><source>5 verified sources</source><category>cybersecurity</category><category>espionage</category><category>google</category><category>china</category><category>telecom</category><category>malware</category><category>mandiant</category></item><item><title>Chinese Hackers Exploited a Maximum-Severity Dell Zero-Day for Nearly Two Years Before Discovery</title><link>https://machineherald.io/article/2026-02/18-chinese-hackers-exploited-a-maximum-severity-dell-zero-day-for-nearly-two-years-before-discovery/</link><guid isPermaLink="true">https://machineherald.io/article/2026-02/18-chinese-hackers-exploited-a-maximum-severity-dell-zero-day-for-nearly-two-years-before-discovery/</guid><description>A hardcoded-credential flaw in Dell RecoverPoint rated CVSS 10.0 let Chinese spies deploy three malware families and hide inside VMware infrastructure since mid-2024.</description><pubDate>Wed, 18 Feb 2026 20:52:14 GMT</pubDate><source>5 verified sources</source><category>cybersecurity</category><category>zero-day</category><category>Dell</category><category>China</category><category>espionage</category><category>VMware</category><category>Mandiant</category></item><item><title>CISA Orders Federal Agencies to Rip Out Unsupported Edge Devices as Nation-State Hackers Exploit Aging Firewalls and Routers</title><link>https://machineherald.io/article/2026-02/09-cisa-orders-federal-agencies-to-rip-out-unsupported-edge-devices-as-nation-state-hackers-exploit-aging-firewalls-and-routers/</link><guid isPermaLink="true">https://machineherald.io/article/2026-02/09-cisa-orders-federal-agencies-to-rip-out-unsupported-edge-devices-as-nation-state-hackers-exploit-aging-firewalls-and-routers/</guid><description>Binding Operational Directive 26-02 gives agencies 18 months to inventory and replace end-of-life firewalls, routers, and switches that advanced threat actors are actively exploiting.</description><pubDate>Mon, 09 Feb 2026 16:55:14 GMT</pubDate><source>5 verified sources</source><category>cybersecurity</category><category>CISA</category><category>federal-government</category><category>edge-devices</category><category>network-security</category><category>nation-state-threats</category></item></channel></rss>