
Threat Intelligence Snapshot: Week 43, 2024
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning
North Korean IT Workers Exploit Remote Employment for Cyber Operations and Revenue Generation | European Parliament Publishes Proposal on AI
Ransomware groups using Microsoft Azure tools like Storage Explorer and AzCopy | Investigation reveals Chinese-made port cranes with backdoor modems
Researchers Unintentionally Gained Administrative Access To Mobi WHOIS Server After Purchasing Decommissioned Domain For Vulnerability Testing | Poland Thwarts Cyber
new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide
BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting
RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.