
Threat Intelligence Snapshot: Week 10, 2024
Phobos ransomware exploits vulnerabilities via Smokeloader and Cobalt Strike | China’s Two sessions 2024
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Phobos ransomware exploits vulnerabilities via Smokeloader and Cobalt Strike | China’s Two sessions 2024

Doppelgänger: Influence Operation Targets German Political Landscape | NIST Cybersecurity Framework 2.0 Points at Supply Chain and AI Risks

Global Law Enforcement Operation Successfully Disrupts LockBit Ransomware | AI Technologies To Fuel Disinformation Risks On 2024 Elections

Patch Tuesday: Microsoft Patches 73 Flaws, Three Zero-Days | US Joint Cyber Defense Collaborative Presents 2024 Priorities

AnyDesk Revoked Security-Related Certificates due to a Cyberattack | Governments Take Measures Against Commercial Spyware

UNC4990 Distributes Malicious Payloads | Back-Ups and Measures Mitigating Data Exfiltration Are Key To Avoid Ransom Payment

Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat

North Korean Threat Actor Gathering Strategic Intelligence | GDPR Enforcement: France’s Fines Amazon EUR 32 Million For Employee Monitoring

Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti

Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure