
Threat Intelligence Snapshot: Week 16, 2025
CVE Program Faces Funding Cutoff, Jeopardizing Vulnerability Coordination Infrastructure | Tariffs Update: EU Suspends US Tariffs For 90 Days, China
CVE Program Faces Funding Cutoff, Jeopardizing Vulnerability Coordination Infrastructure | Tariffs Update: EU Suspends US Tariffs For 90 Days, China
Ivanti Discloses Critical Zero-Day Vulnerability in Connect Secure Exploited by China-Linked UNC5221 | European Parliament Agrees To Delay Application Of
Multi-Stage Attack Targets Microsoft Teams Users with Malware and Remote Access Tools | European Financial Authorities Call For Vigilance Amid
IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela
Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and
Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek
QuoIntelligence GmbH, a recognized European Threat Intelligence provider, has been awarded a 1.4-million-euro contract to provide ENISA with cyber threat
StargazerGoblin exploits #GitHub to distribute Lumma Stealer | taly’s Data Protection Authority demands answers from DeepSeek
Star Blizzard Shifts TTPs with WhatsApp Spear Phishing | Trump Revokes Executive Order Addressing AI Risks
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament