
Threat Intelligence Snapshot: Week 36, 2024
new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide

new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide

BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting

RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats

‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI

‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI

Security Flaw in Proofpoint’s Email Routing System, Ransomware Groups Exploit ESXi CVE | European Artificial Intelligence Act Comes Into Force

Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development

EstateRansomware’s exploits Veeam vulnerability, ServiceNow MID Server critical CVEs | Germany to remove Huawei and ZTE from 5G networks

Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation

TeamViewer Reports Intrusion, China-linked APT Velvet Ant Exploits Cisco Nexus | EU Imposes Duties on China-built EVs
Try searching our blog

Suspected Chinese APT Salt Typhoon Targets Italian IT Service Provider | US Treasury Warns Shippers Not To Pay Hormuz Tolls, Even In Form of Charity

TeamPCP Deploys Self-Replicating npm Worm Across Multiple Software Supply Chain Vectors | China Bans Dual-Use Item Exports To Seven European Entities Over Taiwan Arms Sales

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance