
Threat Intelligence Snapshot: Week 10, 2024
Phobos ransomware exploits vulnerabilities via Smokeloader and Cobalt Strike | China’s Two sessions 2024
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Phobos ransomware exploits vulnerabilities via Smokeloader and Cobalt Strike | China’s Two sessions 2024

Doppelgänger: Influence Operation Targets German Political Landscape | NIST Cybersecurity Framework 2.0 Points at Supply Chain and AI Risks

Global Law Enforcement Operation Successfully Disrupts LockBit Ransomware | AI Technologies To Fuel Disinformation Risks On 2024 Elections

Patch Tuesday: Microsoft Patches 73 Flaws, Three Zero-Days | US Joint Cyber Defense Collaborative Presents 2024 Priorities

AnyDesk Revoked Security-Related Certificates due to a Cyberattack | Governments Take Measures Against Commercial Spyware

UNC4990 Distributes Malicious Payloads | Back-Ups and Measures Mitigating Data Exfiltration Are Key To Avoid Ransom Payment

Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat

North Korean Threat Actor Gathering Strategic Intelligence | GDPR Enforcement: France’s Fines Amazon EUR 32 Million For Employee Monitoring

Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti

Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue