
Threat Intelligence Snapshot: Week 06, 2024
AnyDesk Revoked Security-Related Certificates due to a Cyberattack | Governments Take Measures Against Commercial Spyware

AnyDesk Revoked Security-Related Certificates due to a Cyberattack | Governments Take Measures Against Commercial Spyware

UNC4990 Distributes Malicious Payloads | Back-Ups and Measures Mitigating Data Exfiltration Are Key To Avoid Ransom Payment

Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat

North Korean Threat Actor Gathering Strategic Intelligence | GDPR Enforcement: France’s Fines Amazon EUR 32 Million For Employee Monitoring

Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti

Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze

Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze

A critical vulnerability in Google’s authentication process allows cybercriminal to regenerate and reuse stolen cookies indefinitely.

Final Weekly Intelligence Bulletin of 2023 | Kaspersky reveals more about Operation Triangulation, the highly advanced spyware.

In this Week’s Intelligence Update: Newly Discovered SMTP Smuggling Attack | Geopolitical Implications of Iranian Petrol Station Cyberattack
Try searching our blog

Suspected Chinese APT Salt Typhoon Targets Italian IT Service Provider | US Treasury Warns Shippers Not To Pay Hormuz Tolls, Even In Form of Charity

TeamPCP Deploys Self-Replicating npm Worm Across Multiple Software Supply Chain Vectors | China Bans Dual-Use Item Exports To Seven European Entities Over Taiwan Arms Sales

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance