<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>APT Groups &#8211; Brandefense</title>
	<atom:link href="https://brandefense.io/category/blog/apt-groups/feed/" rel="self" type="application/rss+xml" />
	<link>https://brandefense.io</link>
	<description>Digital Risk Protection Services Platform  &#124; Brandefense</description>
	<lastBuildDate>Fri, 17 Apr 2026 10:51:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://brandefense.io/wp-content/uploads/2021/05/logo_black-150x150.png</url>
	<title>APT Groups &#8211; Brandefense</title>
	<link>https://brandefense.io</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Agentic AI in Cybersecurity: How Autonomous Agents Are Transforming the SOC</title>
		<link>https://brandefense.io/blog/agentic-ai-cybersecurity-soc/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 10:40:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34141</guid>

					<description><![CDATA[<p>Agentic AI is reshaping cybersecurity operations by enabling autonomous threat triage, investigations, and rapid containment. Learn how AI-powered SOC teams are defending at machine speed.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/agentic-ai-cybersecurity-soc/">Agentic AI in Cybersecurity: How Autonomous Agents Are Transforming the SOC</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>From Weeks to Seconds: What AI Actually Changes in the CTI Lifecycle</title>
		<link>https://brandefense.io/blog/ai-cyber-threat-intelligence-lifecycle/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:49:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[Attack Surface Monitoring]]></category>
		<category><![CDATA[Cyber Risk Exposure]]></category>
		<category><![CDATA[cyber threat intelligence]]></category>
		<category><![CDATA[dark web monitoring]]></category>
		<category><![CDATA[external attack surface management]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34101</guid>

					<description><![CDATA[<p>Learn how AI-driven CTI platforms eliminate delays, reduce noise, and deliver real-time intelligence to stop threats before they escalate.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/ai-cyber-threat-intelligence-lifecycle/">From Weeks to Seconds: What AI Actually Changes in the CTI Lifecycle</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>GC01 (Golden Chickens): Inside the Arsenal of a Premier E-Crime MaaS Provider</title>
		<link>https://brandefense.io/blog/golden-chickens-gc01-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:00:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34052</guid>

					<description><![CDATA[<p>Golden Chickens (GC01) is a top-tier Malware-as-a-Service provider enabling cybercriminal operations worldwide. Discover its tools, tactics, and impact.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/golden-chickens-gc01-apt-group/">GC01 (Golden Chickens): Inside the Arsenal of a Premier E-Crime MaaS Provider</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>BlackTech</title>
		<link>https://brandefense.io/blog/blacktech-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 13:43:20 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34040</guid>

					<description><![CDATA[<p>BlackTech is a China-aligned APT group specializing in long-term cyber espionage through network infrastructure compromise, targeting telecom, government, and tech sectors.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/blacktech-apt-group/">BlackTech</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>UAC-0194: Inside a Rapidly Evolving NTLM-Exploiting Espionage Operation</title>
		<link>https://brandefense.io/blog/uac-0194-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 13:27:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34132</guid>

					<description><![CDATA[<p>UAC-0194 is a high-risk, Russian-affiliated threat actor leveraging NTLM vulnerabilities for stealthy credential theft and cyber espionage across Eastern Europe.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/uac-0194-apt-group/">UAC-0194: Inside a Rapidly Evolving NTLM-Exploiting Espionage Operation</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>UAC-0102: Inside a Covert Espionage Operation Targeting Ukraine and Beyond</title>
		<link>https://brandefense.io/blog/uac-0102-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 08:37:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=33998</guid>

					<description><![CDATA[<p>UAC-0102 is a stealth-focused cyber espionage group targeting Ukrainian government and infrastructure entities using spearphishing and cloud-based C2 techniques.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/uac-0102-apt-group/">UAC-0102: Inside a Covert Espionage Operation Targeting Ukraine and Beyond</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Inside the Operations of Crazy Evil: The Rise of a Global Crypto-Focused Cybercrime Network</title>
		<link>https://brandefense.io/blog/crazy-evil-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sun, 22 Mar 2026 11:21:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=33990</guid>

					<description><![CDATA[<p>An in-depth analysis of Crazy Evil, a financially motivated cybercrime group targeting Web3, crypto platforms, and digital identities through advanced social engineering and malware campaigns.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/crazy-evil-apt-group/">Inside the Operations of Crazy Evil: The Rise of a Global Crypto-Focused Cybercrime Network</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>1 Million User Records Exposed: A Deep Dive into the Komiko AI App Data Breach</title>
		<link>https://brandefense.io/blog/komiko-ai-app-data-breach/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sat, 21 Mar 2026 07:12:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34012</guid>

					<description><![CDATA[<p>A massive Komiko AI data breach exposed over 1 million users, including OAuth tokens and session data—creating critical account takeover risks. Here’s what happened and how Brandefense detected it early.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/komiko-ai-app-data-breach/">1 Million User Records Exposed: A Deep Dive into the Komiko AI App Data Breach</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Konni (Vedalia / TA406 / Opal Sleet): North Korea’s Steady Hand in Espionage Operations</title>
		<link>https://brandefense.io/blog/konni-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Thu, 19 Mar 2026 06:54:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=33994</guid>

					<description><![CDATA[<p>Konni is a North Korea-aligned APT group focused on long-term cyber espionage through spearphishing, credential harvesting, and lightweight malware campaigns.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/konni-apt-group/">Konni (Vedalia / TA406 / Opal Sleet): North Korea’s Steady Hand in Espionage Operations</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Warlock Group: The Rise of GOLD SALEM (Storm-2603) in 2025’s Ransomware Landscape</title>
		<link>https://brandefense.io/blog/warlock-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 12:41:05 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34031</guid>

					<description><![CDATA[<p>Warlock Group (GOLD SALEM / Storm-2603) is an emerging ransomware actor exploiting SharePoint ToolShell vulnerabilities to target global enterprises with double extortion tactics.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/warlock-group/">Warlock Group: The Rise of GOLD SALEM (Storm-2603) in 2025’s Ransomware Landscape</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
