BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Nation-State Roundup: China-Linked Espionage Campaign Hits 42 Countries, CISA Adds Critical Cisco Flaws to KEV

Nation-State Roundup: China-Linked Espionage Campaign Hits 42 Countries, CISA Adds Critical Cisco Flaws to KEV

February 27, 2026Nation-State & APT4 min readcritical

Originally reported by Security Affairs, The Record

#china-apt#cisco-sd-wan#cve-kev#spyware#vulnerability-management#incident-response#government-security#supply-chain
Share

TL;DR

CISA added critical Cisco SD-WAN vulnerabilities to its Known Exploited Vulnerabilities catalog while Google disrupted a China-linked espionage campaign spanning 53 organizations across 42 countries. Meanwhile, a former U.S. Air Force officer was arrested for allegedly providing combat training to Chinese military pilots.

Why critical?

CISA added actively exploited Cisco SD-WAN vulnerabilities to the KEV catalog, indicating confirmed exploitation in the wild. Combined with a widespread China-linked espionage campaign affecting 53 organizations across 42 countries, this represents immediate critical threats to infrastructure.

Critical Infrastructure Under Fire

The digital battleground intensified this week as multiple nation-state activities converged with critical infrastructure vulnerabilities and high-profile arrests.

CISA Flags Critical Cisco SD-WAN Exploits

The U.S. Cybersecurity and Infrastructure Security Agency added two Cisco SD-WAN vulnerabilities to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. The agency's KEV listing indicates these flaws pose immediate risk to federal networks and critical infrastructure.

Cisco's SD-WAN infrastructure serves as a backbone for enterprise networking, making successful exploitation particularly damaging for organizational communications and data flows. Federal agencies must patch these vulnerabilities by CISA's mandated deadline to maintain network authorization.

Google Disrupts Massive China-Linked Campaign

Google's Threat Analysis Group dismantled a sophisticated cyberespionage operation targeting government and telecommunications infrastructure across 42 countries. The China-linked threat actor compromised at least 53 organizations, demonstrating the scale and coordination typical of state-sponsored operations.

The campaign focused on telecommunications providers and government entities - prime targets for intelligence collection and potential supply chain compromises. Google's disruption likely prevented further data exfiltration and network persistence across affected organizations.

Former Air Force Officer Charged in Chinese Training Scheme

Federal authorities arrested Gerald Eddie Brown, 65, a former U.S. Air Force officer, for allegedly providing combat aircraft training to Chinese Air Force pilots. Brown spent nearly three years in China before his arrest in Indiana, highlighting the persistent threat of insider recruitment by foreign intelligence services.

The case underscores ongoing Chinese efforts to acquire U.S. military expertise through human intelligence operations. Brown's arrest follows a pattern of similar cases involving former U.S. military personnel recruited to support Chinese military modernization efforts.

Intellexa Spyware Convictions Signal Crackdown

A Greek court sentenced the founder of Intellexa Consortium and three associates to eight years in prison for their role in a domestic spyware scandal. The convictions mark a significant legal precedent against commercial spyware operators who enable government surveillance overreach.

Intellexa's Predator spyware has been linked to surveillance operations across multiple countries, targeting journalists, activists, and political opposition figures. The sentences may signal increased judicial willingness to hold spyware vendors accountable for enabling human rights violations.

Widespread Configuration Failures Expose Credentials

Mysterium VPN researchers discovered 12 million IP addresses exposing .env files containing database credentials, API keys, and other sensitive configuration data. The findings reveal systematic failures in secure deployment practices across organizations worldwide.

Environment files frequently contain production secrets that enable lateral movement and privilege escalation in compromised networks. The scale of exposure suggests many organizations lack basic security hygiene in their deployment pipelines, creating opportunities for both opportunistic attackers and sophisticated threat actors.

Policy and Infrastructure Updates

Senator Ron Wyden blocked confirmation of Christopher Rudd to lead U.S. Cyber Command and NSA, citing insufficient background for the role. Meanwhile, the UK government deployed automated vulnerability scanning across public sector networks, claiming significant reductions in remediation times for critical security flaws.

The UK's automated approach represents a shift toward systematic vulnerability management in government networks, potentially offering a model for other nations struggling with public sector cybersecurity.

AI Integration in Incident Response

Security teams increasingly deploy artificial intelligence to accelerate incident response workflows, with AI systems correlating alerts and generating preliminary reports within minutes. The technology addresses the fundamental scaling challenge in security operations, where human analysts cannot process the volume of alerts generated by modern security tools.

While AI augmentation shows promise for reducing response times, organizations must carefully balance automation with human oversight to avoid false positives and ensure appropriate incident classification.

Sources

  • U.S. CISA adds Cisco SD-WAN flaws to its Known Exploited Vulnerabilities catalog
  • Google disrupts China-linked cyberespionage campaign spanning dozens of countries
  • Former Air Force officer arrested for conspiring with hacker to provide flight training to Chinese military
  • Intellexa founder, three others sentenced to 8 years in prison over Greek spyware scandal
  • Wyden blocks Rudd confirmation to lead Cyber Command, NSA
  • After years of government cyber trouble, UK turns to automated scanning to speed fixes
  • 12 Million exposed .env files reveal widespread security failures
  • How AI Aids Incident Response: Why Humans Alone Cannot Do IR Efficiently

Originally reported by Security Affairs, The Record

Tags

#china-apt#cisco-sd-wan#cve-kev#spyware#vulnerability-management#incident-response#government-security#supply-chain

Tracked Companies

🇬🇷Intellexa
🇺🇸Google

Related Intelligence

  • CISA KEV Updates, APT28 Campaign, and Agentic AI Security Challenges

    criticalMar 10, 2026
  • Iranian Prayer App Compromised for US/Israeli Propaganda Campaign

    mediumMar 5, 2026
  • US Government iPhone Exploitation Toolkit 'Coruna' Allegedly Compromised by Foreign Adversaries

    highMar 4, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← New Campaign Targets Healthcare & Education While Blockchain C2 Evolves Evasion

Next Article

Industry Roundup: Three-Year Cisco Zero-Day, Law Enforcement Wins, and UK Policy Shifts →