<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Adversary Wire — Threat Intelligence Briefings</title><description>Threat intelligence briefings and analysis for business and security leaders.</description><link>https://adversarywire.com/</link><item><title>The Attack Is Coming From Inside the Country: China&apos;s Compromised-Device Networks and Why Your Perimeter Controls Miss Them</title><link>https://adversarywire.com/commentary/china-orb-networks-defender-blind-spot/</link><guid isPermaLink="true">https://adversarywire.com/commentary/china-orb-networks-defender-blind-spot/</guid><description>A joint advisory from CISA, NCSC, and ten allied nations describes how China-linked threat actors have abandoned dedicated attack infrastructure in favour of networks of compromised home routers and IoT devices. The implication for defenders is worse than it sounds.</description><pubDate>Thu, 21 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">commentary</aw:type><aw:sectors xmlns:aw="https://adversarywire.com/ns">critical-infrastructure,communications,ot-ics</aw:sectors><category>China</category><category>Volt Typhoon</category><category>Flax Typhoon</category><category>ORB networks</category><category>SOHO routers</category><category>pre-positioning</category><category>network security</category><category>Five Eyes</category><category>threat intelligence</category></item><item><title>Critical Unpatched RCE in Siemens RUGGEDCOM and ScadaBR — No Fix Available for Either</title><link>https://adversarywire.com/briefings/cisa-ics-rce-ruggedcom-scadabr-may-2026/</link><guid isPermaLink="true">https://adversarywire.com/briefings/cisa-ics-rce-ruggedcom-scadabr-may-2026/</guid><description>CISA&apos;s May 19 ICS advisories flag unauthenticated root-level code execution in Siemens RUGGEDCOM APE1808 and ScadaBR SCADA software. Neither has a patch. The ScadaBR vendor has not responded to CISA.</description><pubDate>Thu, 21 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">flash-briefing</aw:type><aw:severity xmlns:aw="https://adversarywire.com/ns">critical</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">ot-ics,critical-infrastructure</aw:sectors><category>Siemens</category><category>RUGGEDCOM</category><category>ScadaBR</category><category>RCE</category><category>ICS</category><category>SCADA</category><category>CVE-2026-0300</category><category>unpatched</category><category>OT</category><category>CISA</category></item><item><title>Volt Typhoon Activity Confirmed Across UK Water and Energy OT Networks</title><link>https://adversarywire.com/briefings/volt-typhoon-uk-utilities-briefing/</link><guid isPermaLink="true">https://adversarywire.com/briefings/volt-typhoon-uk-utilities-briefing/</guid><description>NCSC and Five Eyes partners have confirmed Volt Typhoon intrusions at operational technology networks in UK water treatment and regional energy distribution. The group is not causing disruption — it is waiting.</description><pubDate>Tue, 19 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">flash-briefing</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">Volt Typhoon</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">critical</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">ot-ics,critical-infrastructure</aw:sectors><category>Volt Typhoon</category><category>China</category><category>OT</category><category>ICS</category><category>NCSC</category><category>pre-positioning</category><category>water</category><category>energy</category></item><item><title>Volt Typhoon: The Long Game in Western Critical Infrastructure</title><link>https://adversarywire.com/analysis/volt-typhoon-deep-dive/</link><guid isPermaLink="true">https://adversarywire.com/analysis/volt-typhoon-deep-dive/</guid><description>A deep analysis of Volt Typhoon&apos;s objectives, methods, and targets — and what the sustained Chinese pre-positioning campaign in Western CNI means for how operators, regulators, and governments need to respond.</description><pubDate>Sun, 17 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">deep-dive</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">Volt Typhoon</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">critical</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">ot-ics,critical-infrastructure,communications,transport</aw:sectors><category>Volt Typhoon</category><category>China</category><category>OT</category><category>ICS</category><category>LOTL</category><category>CNI</category><category>pre-positioning</category><category>CISA</category><category>NCSC</category></item><item><title>NHS Trusts Targeted in Coordinated Ransomware Wave as RaaS Affiliates Shift Focus</title><link>https://adversarywire.com/briefings/nhs-ransomware-wave-briefing/</link><guid isPermaLink="true">https://adversarywire.com/briefings/nhs-ransomware-wave-briefing/</guid><description>A cluster of ransomware affiliates, several previously linked to ALPHV/BlackCat, has targeted three NHS trusts in the past six weeks. Attackers are exploiting legacy VPN appliances and unpatched remote access infrastructure.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">flash-briefing</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">RansomHub affiliates</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">high</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">healthcare</aw:sectors><category>ransomware</category><category>NHS</category><category>healthcare</category><category>RaaS</category><category>ALPHV</category><category>RansomHub</category><category>VPN</category></item><item><title>Why Ransomware Groups Don&apos;t Die When You Arrest Their Leaders</title><link>https://adversarywire.com/commentary/ransomware-ecosystem-commentary/</link><guid isPermaLink="true">https://adversarywire.com/commentary/ransomware-ecosystem-commentary/</guid><description>The ransomware-as-a-service model has created a resilient criminal infrastructure that survives law enforcement actions, FBI seizures, and individual prosecutions. Understanding why is the first step to defending against it.</description><pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">commentary</aw:type><category>ransomware</category><category>RaaS</category><category>ALPHV</category><category>LockBit</category><category>RansomHub</category><category>cybercrime</category><category>criminal ecosystem</category></item><item><title>Salt Typhoon: How China Compromised the West&apos;s Wiretap Infrastructure</title><link>https://adversarywire.com/analysis/salt-typhoon-deep-dive/</link><guid isPermaLink="true">https://adversarywire.com/analysis/salt-typhoon-deep-dive/</guid><description>The Salt Typhoon campaign against US and European telecommunications carriers was not a data breach in any conventional sense. It was a strategic intelligence operation targeting the systems governments use to conduct lawful surveillance.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">deep-dive</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">Salt Typhoon</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">critical</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">communications</aw:sectors><category>Salt Typhoon</category><category>China</category><category>telecoms</category><category>CALEA</category><category>lawful intercept</category><category>espionage</category><category>AT&amp;T</category><category>Verizon</category><category>GhostEmperor</category></item><item><title>FIN7 Pivots to Financial Services with New Phishing Infrastructure and Loader Malware</title><link>https://adversarywire.com/briefings/fin7-financial-services-briefing/</link><guid isPermaLink="true">https://adversarywire.com/briefings/fin7-financial-services-briefing/</guid><description>The FIN7 group has refreshed its phishing infrastructure and is deploying a new loader variant against mid-tier UK and European financial institutions. Targets include wealth managers, brokers, and payment processors.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">flash-briefing</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">FIN7</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">high</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">finance</aw:sectors><category>FIN7</category><category>phishing</category><category>financial services</category><category>malware</category><category>loader</category><category>Carbon Spider</category></item><item><title>Salt Typhoon Access Persists in European Telecoms More Than a Year After Initial Disclosure</title><link>https://adversarywire.com/briefings/salt-typhoon-telecoms-briefing/</link><guid isPermaLink="true">https://adversarywire.com/briefings/salt-typhoon-telecoms-briefing/</guid><description>Fourteen months after the US disclosed Salt Typhoon&apos;s compromise of major American carriers, intelligence assessments confirm the same group retains access inside at least two major European telecommunications networks.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">flash-briefing</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">Salt Typhoon</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">critical</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">communications</aw:sectors><category>Salt Typhoon</category><category>China</category><category>telecoms</category><category>CALEA</category><category>lawful intercept</category><category>espionage</category><category>GhostEmperor</category></item><item><title>The OT/ICS Blind Spot: Why Your Cyber Risk Picture Is Missing Half the Picture</title><link>https://adversarywire.com/commentary/ot-ics-boardroom-blind-spot/</link><guid isPermaLink="true">https://adversarywire.com/commentary/ot-ics-boardroom-blind-spot/</guid><description>Most boards have a reasonable grasp of IT cyber risk. Almost none have adequate visibility into the operational technology that runs their industrial processes, utilities, and physical infrastructure. This gap is exactly what state actors are exploiting.</description><pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">commentary</aw:type><aw:sectors xmlns:aw="https://adversarywire.com/ns">ot-ics,critical-infrastructure</aw:sectors><category>OT</category><category>ICS</category><category>SCADA</category><category>boardroom</category><category>risk</category><category>air gap</category><category>Purdue model</category></item><item><title>Cl0p Exploiting File Transfer Vulnerabilities Across Transport and Logistics Sector</title><link>https://adversarywire.com/briefings/clop-transport-logistics-briefing/</link><guid isPermaLink="true">https://adversarywire.com/briefings/clop-transport-logistics-briefing/</guid><description>The Cl0p ransomware group is mass-exploiting a newly disclosed vulnerability in a widely used managed file transfer platform. Several European freight and logistics operators have been impacted, with customs and supply chain data exfiltrated.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">flash-briefing</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">Cl0p</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">high</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">transport</aw:sectors><category>Cl0p</category><category>ransomware</category><category>transport</category><category>logistics</category><category>MFT</category><category>supply chain</category><category>file transfer</category></item><item><title>Scattered Spider: When Social Engineering Becomes a Professional Discipline</title><link>https://adversarywire.com/analysis/scattered-spider-deep-dive/</link><guid isPermaLink="true">https://adversarywire.com/analysis/scattered-spider-deep-dive/</guid><description>The group behind the MGM Resorts and Caesars Entertainment attacks isn&apos;t a nation-state operation or a seasoned criminal enterprise. They&apos;re young, English-speaking, and they&apos;re better at manipulating people than most security teams are at stopping them.</description><pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">deep-dive</aw:type><aw:actor xmlns:aw="https://adversarywire.com/ns">Scattered Spider</aw:actor><aw:severity xmlns:aw="https://adversarywire.com/ns">high</aw:severity><aw:sectors xmlns:aw="https://adversarywire.com/ns">finance,communications</aw:sectors><category>Scattered Spider</category><category>social engineering</category><category>vishing</category><category>MFA fatigue</category><category>SIM swapping</category><category>MGM</category><category>Caesars</category><category>identity</category></item><item><title>Nation-State Threats: What Business Leaders Get Wrong and Why It Matters</title><link>https://adversarywire.com/commentary/nation-state-threats-business-leaders/</link><guid isPermaLink="true">https://adversarywire.com/commentary/nation-state-threats-business-leaders/</guid><description>Most executives conflate nation-state cyber activity with the ransomware threat they&apos;re more familiar with. They are different in purpose, method, and the defences required. Getting this wrong shapes your entire risk posture.</description><pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">commentary</aw:type><aw:sectors xmlns:aw="https://adversarywire.com/ns">critical-infrastructure,finance,communications</aw:sectors><category>nation-state</category><category>APT</category><category>espionage</category><category>China</category><category>Russia</category><category>Iran</category><category>threat intelligence</category></item><item><title>The Real Cost of a Critical Infrastructure Attack: Beyond the Ransom</title><link>https://adversarywire.com/commentary/true-cost-cni-attack/</link><guid isPermaLink="true">https://adversarywire.com/commentary/true-cost-cni-attack/</guid><description>When a critical infrastructure operator is hit, the ransom payment is usually the smallest line on the eventual damage assessment. The true costs — operational, regulatory, reputational, and systemic — are far larger and far longer-lasting.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><aw:type xmlns:aw="https://adversarywire.com/ns">commentary</aw:type><aw:sectors xmlns:aw="https://adversarywire.com/ns">critical-infrastructure,ot-ics,transport,healthcare</aw:sectors><category>ransomware</category><category>cost</category><category>Colonial Pipeline</category><category>NotPetya</category><category>incident response</category><category>regulatory</category><category>business continuity</category></item></channel></rss>