[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$ff0YwFHXMmmMGLbEwLs4CSnHwpcU7rxsx_J-fUjpyay8":3},{"article":4,"iocs":38},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":11,"published_at":13,"ingested_at":14,"relevance_score":15,"entities":16,"category_id":23,"category":24,"article_tags":27},"ee210183-4e32-4604-9252-b35b5f7f3a97","Lab52 released a paper on APT29 and suspected state-sponsored computer espionage by the Russian F...","lab52-released-a-paper-on-apt29-and-suspected-state-sponsored-computer-espionage-958074","Lab52 released a paper on APT29 and suspected state-sponsored computer espionage by the Russian Federation targeting Spain\n\nI was going to read the paper, but then I saw it's 142 pages\n\nThis is a book bro wtf","Lab52 released an extensive research paper detailing APT29 activities linked to Russian state-sponsored computer espionage targeting Spain. The report appears to document the threat actor's tactics, techniques, and infrastructure used in the campaign. The comprehensive nature of the analysis (142 pages) suggests detailed technical and operational findings.","Lab52 publishes 142-page report on APT29 espionage campaign targeting Spain.",null,"https:\u002F\u002Fx.com\u002Fvxunderground\u002Fstatus\u002F2052465368967332058","2026-05-07T19:07:31+00:00","2026-05-07T20:00:08.240175+00:00",7,[17,20],{"name":18,"type":19},"APT29","threat_actor",{"name":21,"type":22},"Lab52","vendor","6cbdd207-aaa1-4176-9534-e156b125e917",{"id":23,"icon":11,"name":25,"slug":26},"Nation-state","nation-state",[28,33],{"category":29},{"id":30,"icon":11,"name":31,"slug":32},"614132b8-5837-4952-b8b5-c6c9a32a1d85","Privacy","privacy",{"category":34},{"id":35,"icon":11,"name":36,"slug":37},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]