Aggregator
Turning Threat Intelligence into Bug Bounty Gold: A Practical Workflow
日本计划禁止飞机乘客使用充电宝
【资料】近期《情报杂志》以色列、伊朗、美国相关情报研究论文
【工具】伊朗开源情报资源网站
Смартфон работает на мошенников, пока вы спите. Похоже, ваш гаджет нашел себе сомнительную подработку
派拉蒙拟将Paramount+与HBO Max合并
5 years of shifting cybersecurity behavior
Online security is built through routine decisions made across devices and accounts. People choose how to create passwords, how often to reuse them, and how much effort to invest in protecting personal data. The National Cybersecurity Alliance and CybSafe’s Oh, Behave! The Cybersecurity Attitudes and Behaviors Report: 2021–2025 follows those patterns over five years, drawing on responses from more than 24,000 adults and documenting how attitudes and behaviors shift over time. “Five years of data … More →
The post 5 years of shifting cybersecurity behavior appeared first on Help Net Security.
Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations
Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations
Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations
Following the joint military operation known as Operation Epic Fury, the Tenable Research Special Operations (RSO) team is providing an update regarding potential cyber counteroffensive operations conducted by Iran-linked threat actors.
Key takeaways:- Following Operation Epic Fury, Iran-linked threat actors are expected to launch counteroffensive operations against critical infrastructure and opportunistic targets.
- Several Iranian-linked threat groups are affiliated with organizations including the IRGC and MOIS, including the revived Altoufan Team and HANDALA.
- Review and patch the known vulnerabilities exploited by these threat actors and prepare for heightened DDoS and botnet activity in the near term.
On February 28, 2026, the United States and Israel launched Operation Epic Fury, a series of military operations against Iran. As a result, Iran-linked threat actors are expected to launch cyber counteroffensive operations against the United States, Israel and other countries. Critical infrastructure providers as well as other opportunistic targets are likely at risk.
AnalysisOver the last several years, Iranian-nexus threat groups have shifted from stealthy espionage activity to destructive and retaliatory attacks as geopolitical tensions have risen. Wiper malware and ransomware attacks have ramped up in frequency and destructive capabilities as attackers have pivoted to targeting critical infrastructure, including those in Western countries.
Iranian Threat Actor Affiliations
Iranian state-sponsored cyber operations span across multiple groups, from advanced persistent threat (APT) actors to hacktivist fronts linked to both military and civilian agencies. These groups operate under, or maintain ties to, the following organizations:
- Islamic Revolutionary Guard Corps (IRGC): Parallel military force separate from Iran's regular armed forces
- IRGC Intelligence Organization (IRGC-IO): The intelligence arm within the IRGC, focused on surveillance and counterintelligence
- IRGC Cyber-Electronic Command (IRGC-CEC): The IRGC's dedicated cyberwarfare unit
- Ministry of Intelligence and Security (MOIS): Iran's civilian intelligence ministry, combining roles analogous to the CIA and FBI
* Note: Mint Sandstorm is a composite label spanning both APT35 and APT42
Recent reports of Iranian cyber-operations activity
Following the military operations on February 28, researchers have reported probing and staging activities linked to Iranian threat actors, including the revival of the ALTOUFAN TEAM persona tied to Cotton Sandstorm. There have been reports on social media from Iran government-linked hackers warning of “massive cyber attacks in the coming hours.” It’s unclear if successful attacks have taken place. Cyber-analysts should expect increased botnet and distributed denial-of-service (DDoS) activity.
Ongoing monitoringTenable’s RSO continues to monitor for new intelligence on counteroffensive attacks by Iran-linked threat actors. We will publish updates as these developments are confirmed.
Identifying affected systemsIranian threat actors have historically exploited known vulnerabilities in internet-facing devices and applications. A list of Tenable plugins for the vulnerabilities known to be associated with Iranian threat actors can be found here.
Get more informationJoin Tenable's Research Special Operations (RSO) Team on Tenable Connect for further discussions on the latest cyber threats.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations
Following the joint military operation known as Operation Epic Fury, the Tenable Research Special Operations (RSO) team is providing an update regarding potential cyber counteroffensive operations conducted by Iran-linked threat actors.
Key takeaways:- Following Operation Epic Fury, Iran-linked threat actors are expected to launch counteroffensive operations against critical infrastructure and opportunistic targets.
- Several Iranian-linked threat groups are affiliated with organizations including the IRGC and MOIS, including the revived Altoufan Team and HANDALA.
- Review and patch the known vulnerabilities exploited by these threat actors and prepare for heightened DDoS and botnet activity in the near term.
On February 28, 2026, the United States and Israel launched Operation Epic Fury, a series of military operations against Iran. As a result, Iran-linked threat actors are expected to launch cyber counteroffensive operations against the United States, Israel and other countries. Critical infrastructure providers as well as other opportunistic targets are likely at risk.
AnalysisOver the last several years, Iranian-nexus threat groups have shifted from stealthy espionage activity to destructive and retaliatory attacks as geopolitical tensions have risen. Wiper malware and ransomware attacks have ramped up in frequency and destructive capabilities as attackers have pivoted to targeting critical infrastructure, including those in Western countries.
Iranian Threat Actor Affiliations
Iranian state-sponsored cyber operations span across multiple groups, from advanced persistent threat (APT) actors to hacktivist fronts linked to both military and civilian agencies. These groups operate under, or maintain ties to, the following organizations:
- Islamic Revolutionary Guard Corps (IRGC): Parallel military force separate from Iran's regular armed forces
- IRGC Intelligence Organization (IRGC-IO): The intelligence arm within the IRGC, focused on surveillance and counterintelligence
- IRGC Cyber-Electronic Command (IRGC-CEC): The IRGC's dedicated cyberwarfare unit
- Ministry of Intelligence and Security (MOIS): Iran's civilian intelligence ministry, combining roles analogous to the CIA and FBI
* Note: Mint Sandstorm is a composite label spanning both APT35 and APT42
Recent reports of Iranian cyber-operations activity
Following the military operations on February 28, researchers have reported probing and staging activities linked to Iranian threat actors, including the revival of the ALTOUFAN TEAM persona tied to Cotton Sandstorm. There have been reports on social media from Iran government-linked hackers warning of “massive cyber attacks in the coming hours.” It’s unclear if successful attacks have taken place. Cyber-analysts should expect increased botnet and distributed denial-of-service (DDoS) activity.
Ongoing monitoringTenable’s RSO continues to monitor for new intelligence on counteroffensive attacks by Iran-linked threat actors. We will publish updates as these developments are confirmed.
Identifying affected systemsIranian threat actors have historically exploited known vulnerabilities in internet-facing devices and applications. A list of Tenable plugins for the vulnerabilities known to be associated with Iranian threat actors can be found here.
Get more informationJoin Tenable's Research Special Operations (RSO) Team on Tenable Connect for further discussions on the latest cyber threats.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
The post Operation Epic Fury: Potential Iranian Cyber Counteroffensive Operations appeared first on Security Boulevard.
本命年、霉菌与乐山行:阿小信的自由职业周记(2026W8-W9)
左撇子的演化优势
左撇子的演化优势
Вселенная расширяется «неправильно». NASA хочет построить GPS размером с Солнечную систему, чтобы во всем разобраться
星链宣布新一代V2卫星:太空中提供5G
AI Coding Tip 009 - Compact Your Context and Stop Memory Rot
Cybersecurity jobs available right now: March 3, 2026
AI & Data Security Expert Ferrero | Italy | Hybrid – View job details As an AI & Data Security Expert, you will define and maintain security controls for AI solutions, ensuring compliance with evolving threats and regulations. You will advise on data protection, tool selection, and access controls, strengthen AI evaluation frameworks, and drive security awareness and continuous improvement across the organization. Application Security Engineer, VP State Street | United Kingdom | On-site – … More →
The post Cybersecurity jobs available right now: March 3, 2026 appeared first on Help Net Security.
Ex-Nuance IT Worker Pleads Guilty in Geisinger Health Case
A former Nuance Communications IT worker has pleaded guilty in a criminal case that alleged he downloaded and stored on a personal hard drive containing 1.2 million patient records of a client, Geisinger Health, two days after he was terminated from his job in 2023.