
Threat Intelligence Snapshot: Week 7, 2026
Exchange URL Rule Failure Sparks Mass Email Quarantine, ZeroDayRAT Spyware, SSH Botnets and DPRK LinkedIn Fraud Expand Global Threat Landscape

Exchange URL Rule Failure Sparks Mass Email Quarantine, ZeroDayRAT Spyware, SSH Botnets and DPRK LinkedIn Fraud Expand Global Threat Landscape

GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships

Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors

Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia

Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA

Mirai-based botnet exploits zero-day, Ivanti Secure Connect zero-days are actively exploited in the wild | US imposes sanctions on a

Malware designed to terminate Siemens engineering processes, Mirai targets Juniper SSR devices | Italy’s Data Protection Authority fines OpenAI for

Russian state-sponsored Earth Koshchei targets high-profile EU Orgs, Lazarus Group evolves its infection chain | ECB Calls for Stronger Bank
Try searching our blog

Russian-Speaking eCrime Threat Actor Leverages Commercial AI Services to Compromise Over 600 FortiGate Devices | US Supreme Court Strikes Down Trump’s Global Tariffs

UNC6201 Exploiting Zero-day in Dell RecoverPoint to Achieve Persistent Access | Wave of Sabotage Acts Target Italian Railway Network Amid Winter Olympics

Exchange URL Rule Failure Sparks Mass Email Quarantine, ZeroDayRAT Spyware, SSH Botnets and DPRK LinkedIn Fraud Expand Global Threat Landscape | EU Launches 20th Russia Sanctions Package

APT28 Targeting Central and Eastern Europe through CVE‑2026‑21509 Exploitation | UK Opens First Investigations Over Breach Of Cyber Sanctions