• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Phishing Campaign Targeting Messaging Apps Users

    CISA, FBI Warn of Phishing Campaign Targeting Messaging App Users

    Mario Kart, Russian Cybercriminal, Russian Cybercrime, Cybercrime

    Head of Russian Cybercrime Group Mario Kart Sentenced for Locking Out Dozens of U.S. Businesses

    vibe coding safeguards

    ‘Vibe Coding’ Needs Guardrails, Says NCSC Amid Rising AI Security Concerns

    Ministry of Finance cyberattack

    Dutch Finance Ministry Investigates Data Breach in Internal Systems

    Russian Access Broker, Access Broker, Russian Broker, Cyber Exploits, APT28, Russia, Stegnography, CERT-UA

    Russian Access Broker Gets Nearly 7 Yrs for Enabling Millions in Ransomware Extortion

    CVE‑2026‑21992 Oracle Identity Manager

    Oracle Issues Emergency Patch for Critical Flaw Enabling Remote Code Execution

    Crunchyroll data breach

    Cyberattack on Crunchyroll Exposes Risks in Outsourced Systems

    Dr Sheeba Armoogum interview

    The Biggest Threat to Your Digital Security Isn’t a Hacker — It’s Human Nature, Says Dr. Sheeba Armoogum

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Iran Telegram malware

    Iran-Linked Hackers Use Messaging Platform to Target Dissidents and Journalists

    DarkSword, DarkSword iOS Exploit, GTIG, Google, Lookout, iVerify, Apple, iOS Exploit

    Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Vishing Ring, Vishing, Latvia, Ukraine, Cybercrime

    How a Ukrainian Vishing Ring Stole €2M From EU Citizens — and Nearly Got Away

    water infrastructure cybersecurity

    New York Water Systems Get New Cybersecurity Standards and $2.5M Funding

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Phishing Campaign Targeting Messaging Apps Users

    CISA, FBI Warn of Phishing Campaign Targeting Messaging App Users

    Mario Kart, Russian Cybercriminal, Russian Cybercrime, Cybercrime

    Head of Russian Cybercrime Group Mario Kart Sentenced for Locking Out Dozens of U.S. Businesses

    vibe coding safeguards

    ‘Vibe Coding’ Needs Guardrails, Says NCSC Amid Rising AI Security Concerns

    Ministry of Finance cyberattack

    Dutch Finance Ministry Investigates Data Breach in Internal Systems

    Russian Access Broker, Access Broker, Russian Broker, Cyber Exploits, APT28, Russia, Stegnography, CERT-UA

    Russian Access Broker Gets Nearly 7 Yrs for Enabling Millions in Ransomware Extortion

    CVE‑2026‑21992 Oracle Identity Manager

    Oracle Issues Emergency Patch for Critical Flaw Enabling Remote Code Execution

    Crunchyroll data breach

    Cyberattack on Crunchyroll Exposes Risks in Outsourced Systems

    Dr Sheeba Armoogum interview

    The Biggest Threat to Your Digital Security Isn’t a Hacker — It’s Human Nature, Says Dr. Sheeba Armoogum

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Foreign-Made Router, FCC Ban, FCC

    The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

    Iran Telegram malware

    Iran-Linked Hackers Use Messaging Platform to Target Dissidents and Journalists

    DarkSword, DarkSword iOS Exploit, GTIG, Google, Lookout, iVerify, Apple, iOS Exploit

    Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”

    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Vishing Ring, Vishing, Latvia, Ukraine, Cybercrime

    How a Ukrainian Vishing Ring Stole €2M From EU Citizens — and Nearly Got Away

    water infrastructure cybersecurity

    New York Water Systems Get New Cybersecurity Standards and $2.5M Funding

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    AI child safety in India

    India Outlines Legal Framework to Protect Children from AI and Online Harm

    Russia and China Cyberespionage

    Finland Warns Russia and China Cyber Espionage Ops Targeting Tech Sector

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Fraud, Agentic AI

    Agentic AI Run Fraud Campaigns Earning 4.5 Times More: Interpol

    Stryker, Stryker Cyberattack, CISA, Handala

    Stryker Says Cyberattack Disrupted Processing, Manufacturing and Shipping

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber News

China Sits at the Top of America’s Cyber Threat List

Mihir Bagwe by Mihir Bagwe
March 19, 2026
in Cyber News, Cyber Warfare, Firewall Daily
0
China, Top Cyber Threat, Cyber Threat List, Iran, Russia, North Korea
629
SHARES
3.5k
VIEWS
Share on LinkedInShare on Twitter

Just a week after the Stryker wiper attack claimed by the Iranian hacker group Handala made global headlines, the U.S. Intelligence Community says its China that we should be worried about instead.

The 2026 Annual Threat Assessment, published by the Office of the Director of National Intelligence, named China, Russia, Iran, and North Korea as the four nation-state cyber actors most actively targeting U.S. government, private-sector, and critical infrastructure networks. It does not rank them by severity — it ranks them by role. And the roles are distinct.

China: Pre-Positioned, Patient and Already Inside

The IC’s assessment reserves its sharpest language for China. Beijing is the most active and persistent cyber threat to U.S. government, private-sector, and critical infrastructure networks — a designation the report pairs with a specific warning that Chinese cyber actors have already demonstrated the capability to compromise U.S. infrastructure, and they potentially maintain that access not for immediate disruption but for strategic advantage in the event of a conflict.

The distinction matters enormously for defenders. China does not primarily operate as a smash-and-grab actor. It pre-positions — meaning it establishes persistent footholds inside networks months or years before any potential military confrontation, ensuring that if tensions over Taiwan or the South China Sea escalate into open conflict, Beijing can trigger disruptions to U.S. transportation, logistics, and communications systems at a moment of its choosing. The ATA explicitly warns that a conflict over Taiwan would expose the U.S. to significant cyber attacks against its transportation sector.

“If the U.S. were to intervene (in China-Taiwan conflict), it probably would face significant but recoverable disruptions to its transportation sector from Chinese cyber attacks.”

China’s cyber ambitions also extend far beyond espionage. The report notes that Beijing continues to work to maintain U.S. dependence on sectors where it holds supply chain leverage — critical minerals, energy storage, pharmaceuticals, and unmanned aerial systems — while simultaneously accelerating its own decoupling from U.S. technology in semiconductors and artificial intelligence. The cyber program supports both these objectives. One of stealing what it needs and second of protecting what it builds.

Russia: Gray Zone Sabotage as Standard Operating Procedure

Russia’s cyber posture in the ATA reflects a different strategic logic. Unlike China’s long-horizon pre-positioning, it focuses on continuous, deniable harassment of adversaries operating in what the report calls the “gray zone” of geopolitical competition. Russia’s toolkit, the IC assesses, includes cyber attacks, disinformation and influence operations, energy market manipulation, military intimidation, and physical sabotage — all deployed beneath the threshold of declared conflict.

report-ad-banner

Russia has targeted European critical infrastructure with the explicit aim of disrupting the military supply chains that sustain Kyiv. The IC notes that Russia also has advanced counterspace capabilities, hypersonic missiles, and undersea assets designed to negate U.S. military advantages — a portfolio that its cyber operations support through intelligence collection and pre-conflict reconnaissance.

Russia’s gray zone doctrine deliberately makes attribution complicated. Moscow hides and denies its role in cyber operations, making it difficult for the U.S. and its allies to justify public responses or trigger alliance commitments. The IC warns this approach will continue, particularly as Russia leverages its partnerships with China, Iran, and North Korea to share capabilities and evade sanctions.

North Korea: A Billion-Dollar Cyber Economy Funding a Weapons Program

North Korea’s cyber program occupies a unique category. It functions simultaneously as an intelligence collection tool, a sanctions evasion mechanism, and a weapons financing engine. The IC assesses that Pyongyang’s cryptocurrency heists and other financial cybercrimes net at least $1 billion each year, with those proceeds flowing directly into the regime’s nuclear and missile programs.

Read: North Korea’s $3 Billion Mystery: UN Probes Cyberattacks Funding Nuclear Program

The report introduces a dimension that defenders increasingly face but rarely discuss publicly. North Korea’s growing use of IT workers with falsified credentials to gain employment with unwitting companies. This human insider access approach allows Pyongyang to circumvent the technical defenses that would otherwise block external intrusions. It uses a trusted insider inside the network perimeter before any exploit is needed. The IC warns this tactic specifically threatens organizations with stronger defensive measures, because it bypasses the very controls those organizations invested in building.

North Korean cyber actors are also expanding ransomware attacks against U.S. critical infrastructure and businesses — a shift from targeted espionage toward higher-volume, disruptive operations.

Iran: Degraded but Still Dangerous, and Escalating

Iran’s cyber posture, the ATA notes, faces significant constraints following the 12-Day War in 2025. The IC characterizes Iran as a threat to U.S. networks primarily through cyber espionage and attacks against poorly defended targets — but couples that assessment with an explicit warning that Iranian proxies and hacktivists outside Iran will pursue cyber-enabled operations against U.S. targets, even if less technically advanced than state-directed campaigns.

The IC noted that a hacking group linked to Iran claimed responsibility on March 11 for wiping 200,000 systems and extracting 50 terabytes of data from a U.S. medical technology company. That company was Stryker, and the attack represented, in the IC’s own words, a direct cyber retaliation for U.S. operations against Iran.

Read: Who Is Handala — The Iran-Linked Ghost Group That Just Wiped 200K Stryker Devices

Ransomware: The Non-State Accelerant

Beyond nation-states, the ATA identifies financially and ideologically motivated non-state actors like ransomware groups, cybercriminals, and hacktivists, as taking more aggressive cyber attack postures. Ransomware in particular harms U.S. critical infrastructure and business operations, generating operational disruptions, revenue loss, and sensitive data theft at scale. The IC specifically flags a tactical shift in how ransomware groups now operate faster and in high-volume. This compresses the window in which security teams have to detect and respond. The implication is that the dwell-time advantage defenders once relied on has narrowed significantly.

AI and Space: Emerging Force Multipliers for Adversaries

The ATA’s cyber threat picture cannot be read in isolation from two accelerants the report addresses separately. On artificial intelligence, the IC warns that AI already influences targeting and decision-making in active conflicts, and that China — aiming to displace the U.S. as the global AI leader by 2030 — is driving AI adoption at scale using its talent pool, extensive datasets, government funding, and global partnerships. AI’s application to offensive cyber operations, the report notes, holds significant potential to increase the autonomy, speed, and effectiveness of attacks that human operators alone could never sustain at scale.

Also read: European Space Agency Confirms Cybersecurity Breach on External Servers

On space, the IC identifies a growing convergence between cyber risk and satellite infrastructure. Adversaries are using jammers against U.S. satellites, and cyber attacks against satellite communications represent a rising threat as global reliance on digital systems expands the exploitable attack surface. Disruptive attacks against space services have become more common and, the report warns, will likely be normalized during crises or periods of strained relations between nations — a trajectory that places satellite ground systems, communication links, and the commercial constellation operators that power military logistics squarely in the crosshairs of China and Russia’s counterspace programs.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: ChinaCyber Threat ListIranNorth KoreaRansomwareRussiaTop Cyber Threat
Previous Post

Multiple Threat Actors Exploiting a Six-Vulnerability iOS Exploit Kit Dubbed “DarkSword”

Next Post

Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS

Next Post
WebKit vulnerability

Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Foreign-Made Router, FCC Ban, FCC
Compliance

The FCC Just Blocked Every New Foreign-Made Router from the U.S. Market

March 25, 2026
Phishing Campaign Targeting Messaging Apps Users
Cyber News

CISA, FBI Warn of Phishing Campaign Targeting Messaging App Users

March 25, 2026
Mario Kart, Russian Cybercriminal, Russian Cybercrime, Cybercrime
Hacker News

Head of Russian Cybercrime Group Mario Kart Sentenced for Locking Out Dozens of U.S. Businesses

March 25, 2026
vibe coding safeguards
Firewall Daily

‘Vibe Coding’ Needs Guardrails, Says NCSC Amid Rising AI Security Concerns

March 25, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information