
Threat Intelligence Snapshot: Week 11, 2025
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships

GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships

Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors

Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia

Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA

Mirai-based botnet exploits zero-day, Ivanti Secure Connect zero-days are actively exploited in the wild | US imposes sanctions on a

Malware designed to terminate Siemens engineering processes, Mirai targets Juniper SSR devices | Italy’s Data Protection Authority fines OpenAI for

Russian state-sponsored Earth Koshchei targets high-profile EU Orgs, Lazarus Group evolves its infection chain | ECB Calls for Stronger Bank
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure