
CLAWS Cyber Index I Volume II I Issue 04
The first half of March 2026 was characterized by an intensification of grey-zone competition and the sophisticated convergence of cyber and kinetic operations, notably exemplified by “Operation Epic Fury,” where digital exploitation of civilian infrastructure facilitated high-stakes precision strikes. Regional security dynamics were further shaped by state-aligned threat actors like APT36 and SloppyLemming utilizing evolved, evasive toolsets—including Rust-based implants and the Telegram API—to target military and diplomatic sectors across South Asia. Concurrently, global powers accelerated indigenous modernization efforts, such as India’s expansion of S-400 squadrons and the Ghatak UCAV program, to bolster strategic autonomy amidst heightening maritime and territorial tensions. This period also highlighted critical vulnerabilities in the global technology stack, ranging from the commercialization of zero-click exploit chains like “Coruna” to the systemic targeting of hyperscale cloud providers and the open-source software supply chain. Ultimately, these developments underscore a transition toward continuous, low-intensity conflict that necessitates enhanced Allied resilience, zero-trust architectures, and a reassessment of the ethical and operational boundaries of dual-use artificial intelligence.











