
Threat Intelligence Snapshot: Week 30, 2025
Microsoft Reports Chinese State Actors Exploiting SharePoint Vulnerabilities | UK Government Plans Ransom Payment Ban

Microsoft Reports Chinese State Actors Exploiting SharePoint Vulnerabilities | UK Government Plans Ransom Payment Ban

Emerging Ransomware-as-a-Service GLOBAL GROUP Featuring AI Driven Negotiation and Mobile-Friendly Affiliate Controls | ECB Publishes Guide On Banks Outsourcing Cloud

DoNot APT Group Conducts Sophisticated Cyber Espionage Against Southern European Governments | New Houthi Attack In Red Sea Kills Four,

Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof

Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile

EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East:

China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament

Global Spear-Phishing Campaign Targets Executives in Finance and Energy Sectors to Deploy NetBird | ISO Publishes New Standard On AI

APT41 Exploits Google Calendar in Global Espionage Operation | Trump Announces New EU Tariffs, Then Delays Them Until 9 July

Global Malvertising Campaign Impersonates Kling AI To Target Financial Institutions Including Italian Banks | EU Adopts Four Sets of New
Try searching our blog

Suspected Chinese APT Salt Typhoon Targets Italian IT Service Provider | US Treasury Warns Shippers Not To Pay Hormuz Tolls, Even In Form of Charity

TeamPCP Deploys Self-Replicating npm Worm Across Multiple Software Supply Chain Vectors | China Bans Dual-Use Item Exports To Seven European Entities Over Taiwan Arms Sales

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance