
Threat Intelligence Snapshot: Week 26, 2025
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East:
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament
Global Spear-Phishing Campaign Targets Executives in Finance and Energy Sectors to Deploy NetBird | ISO Publishes New Standard On AI
APT41 Exploits Google Calendar in Global Espionage Operation | Trump Announces New EU Tariffs, Then Delays Them Until 9 July
Global Malvertising Campaign Impersonates Kling AI To Target Financial Institutions Including Italian Banks | EU Adopts Four Sets of New
China-Nexus APTs Exploit SAP NetWeaver (CVE-2025-31324) for Strategic Access to Critical Infrastructure | US Experts Find Rogue Communication Devices In
Panda Shop: A Chinese-Linked Smishing Infrastructure Operating at Scale | 19 Member States Still Have Not Fully Transposed the NIS2
Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive
MFA Bypassed Using Stolen Azure Session Cookies | European Commission Releases First Draft of AI Act Guidelines For Consultation
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament