
Threat Intelligence Snapshot: Week 42, 2024
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning
North Korean IT Workers Exploit Remote Employment for Cyber Operations and Revenue Generation | European Parliament Publishes Proposal on AI
Ransomware groups using Microsoft Azure tools like Storage Explorer and AzCopy | Investigation reveals Chinese-made port cranes with backdoor modems
Researchers Unintentionally Gained Administrative Access To Mobi WHOIS Server After Purchasing Decommissioned Domain For Vulnerability Testing | Poland Thwarts Cyber
new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide
BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting
RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
Try searching our blog
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament