BUYER'S GUIDE | SECURITY RESOURCES
Active Threat10 min read

Guide to Finding the Best APT and Nation-State Threat Intelligence News

185+
Named APT groups tracked by major threat intelligence vendors
44%
Of targeted intrusions in 2024 attributed to China-nexus actors
393 days
Average undetected dwell time for state-sponsored APT intrusions
60%
Of APT campaigns use valid credentials as the primary initial access technique

Advanced persistent threat actors — the nation-state-sponsored groups that conduct espionage, intellectual property theft, and pre-positioning for destructive attacks — operate at a level of sophistication, patience, and resource availability that most commercial security programs are not designed to detect. Understanding which groups are active, what sectors they are targeting, and what techniques they are using is the foundation of threat-informed defense for any organization that represents a potential APT target.

This guide evaluates the best sources for APT and nation-state threat intelligence on the criteria that determine operational value: attribution accuracy and methodology, TTP documentation depth, sector and geographic targeting coverage, and speed from intrusion observation to published intelligence.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

Decryption Digest — Best for Daily APT Campaign Coverage

Decryption Digest covers active nation-state campaigns as a primary editorial focus, with daily coverage of newly disclosed APT operations, TTP evolution across named threat groups, targeting pattern shifts, and the specific detection opportunities that allow security teams to identify APT activity before it results in data exfiltration.

For security teams that need to track APT activity without dedicated CTI analysts reading 10 research reports per week, Decryption Digest provides the curated synthesis. Each APT-related item includes the threat actor attribution (using standard industry naming conventions), the specific ATT&CK techniques observed, the targeted sectors, and the defensive actions that address the campaign.

Coverage spans the major nation-state programs: China-nexus actors (APT41, APT40, Volt Typhoon, Salt Typhoon), Russia-nexus actors (APT28, APT29, Sandworm), North Korea-nexus actors (Lazarus Group, BlueNoroff, Kimsuky), and Iran-nexus actors (MuddyWater, APT34, Charming Kitten). Free daily delivery at decryptiondigest.com/newsletter.

Mandiant Threat Intelligence — Best for Attribution Research

Mandiant (Google Threat Intelligence) is the authoritative source for named APT group attribution. The company's two-decade history of responding to nation-state intrusions provides ground-truth attribution data — actual forensic evidence from compromised environments — that most intelligence vendors cannot replicate from telemetry alone.

Mandiant's publicly available APT profiles at mandiant.com document each group's history, TTPs, targeting patterns, and known malware families with the supporting technical evidence. For security architects who need to understand which threat actors are most likely to target their organization given its sector, geography, and data holdings, the Mandiant APT catalog is the reference standard.

The free public Mandiant blog publishes major campaign disclosures and TTP analyses. The full depth of Mandiant's APT intelligence is available in commercial tiers, but the free content remains valuable for organizations without commercial threat intelligence budgets.

CISA and NSA Joint Advisories — Best for Actionable Government Intelligence

When U.S. government agencies publish joint cybersecurity advisories attributing activity to specific nation-state actors, the intelligence underlying those advisories reflects classified sources that no commercial vendor can access. CISA, NSA, FBI, and international partner joint advisories (often with UK NCSC, Australian ASD, Canadian CCCS) represent the highest-confidence public attribution available.

These advisories typically include the specific TTPs used in the attributed campaign, comprehensive IOC lists built from actual victim environments, and detection guidance validated against real intrusion data. For organizations in critical infrastructure sectors — the primary APT targeting priority — CISA joint advisories are the most operationally relevant public intelligence available.

Subscribe to CISA advisory alerts at cisa.gov. Establish a process to ingest IOCs from joint advisories into your SIEM within four hours of publication. These advisories are rare enough (a few per month) that manual processing is feasible, and the intelligence value is too high to automate without review.

Microsoft MSTIC and Google TAG — Best for Technology Platform Threat Intelligence

Microsoft's Threat Intelligence Center (MSTIC) and Google's Threat Analysis Group (TAG) both publish APT intelligence derived from their unique visibility into email platforms, cloud infrastructure, and operating systems used by billions of people globally. This telemetry provides detection and attribution advantages that traditional security vendors cannot replicate.

Microsoft MSTIC's public blog and the Microsoft Security blog publish campaign disclosures covering APT activity that exploits Microsoft products (Exchange, Teams, Windows, Azure AD). For organizations running Microsoft infrastructure, MSTIC disclosures frequently include detection guidance specifically applicable to Microsoft security products.

Google TAG focuses on APT campaigns that use Google products for targeting (Gmail phishing, YouTube account takeovers) and provides regular updates on campaigns targeting high-risk users (journalists, dissidents, political campaigns). Both MSTIC and TAG blogs are free and publish significant original research.

The bottom line

APT intelligence requires multiple complementary sources: Decryption Digest for daily campaign coverage with defensive action focus, Mandiant for deep attribution research and group profiling, CISA and NSA joint advisories for government-intelligence-informed guidance on active campaigns, and Microsoft MSTIC or Google TAG for platform-specific campaign disclosures. Subscribe to Decryption Digest free at decryptiondigest.com/newsletter to track nation-state campaign activity daily without monitoring dozens of separate research blogs.

Frequently asked questions

How do I know if my organization is an APT target?

APT targeting follows predictable patterns based on sector, data holdings, and geopolitical relevance. Organizations in critical infrastructure (energy, water, telecommunications, defense industrial base), those holding government contract data, pharmaceutical and biotech companies, financial institutions, and organizations with significant intellectual property are consistently high-priority APT targets. Geographic factors also matter: organizations operating in geopolitically significant regions or with significant presence in countries that are primary attribution targets face elevated risk.

What is the difference between APT and ransomware threat actors?

APT actors are typically nation-state-sponsored and motivated by espionage, intellectual property theft, or pre-positioning for destructive attacks. They prioritize stealth and long-term access, often remaining undetected for months or years. Ransomware actors are primarily financially motivated and operate on a detect-and-extort model that requires eventual victim notification. The techniques overlap significantly — many ransomware groups use the same initial access and lateral movement TTPs as APT actors — but objectives, dwell time, and operational security tradecraft differ substantially.

Is APT threat intelligence relevant for small and mid-size organizations?

For most SMBs, APT threat intelligence has limited direct operational relevance compared to commodity threat intelligence focused on ransomware, credential theft, and common CVE exploitation. However, SMBs that are in the supply chain of APT-targeted organizations (contractors to defense primes, IT service providers to critical infrastructure, professional services firms with access to large client data) face targeted APT intrusions specifically because they are softer targets than the intended final victim. If your organization has privileged access to APT-priority targets, you are an APT target.

Sources & references

  1. Decryption Digest APT Coverage
  2. Mandiant APT Profiles
  3. MITRE ATT&CK Groups

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.