
Weekly Intelligence Snapshot – Week 45
In our latest Weekly #Intelligence Summary: ASEC Analysis Team has seen LockBit 3.0 Ransomware deployed through Amadey Bot, an Infostealer
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
In our latest Weekly #Intelligence Summary: ASEC Analysis Team has seen LockBit 3.0 Ransomware deployed through Amadey Bot, an Infostealer
Microsoft reports the RaspberryRobin worm is now part of a malware ecosystem and one of the largest active malware distribution
The US publishes its new #NationalSecurity Strategy focussed on China and Russia and emphasizing the key role of the Indo-Pacific
This week the Microsoft Threat Intelligence Center reports on ransomware, “Prestige”, which targets transportation and logistics sectors in Poland and
A CISA advisory reveals vulnerabilities exploited by China-sponsored groups. PatchTuesday: Microsoft fixes 84 #vulnerabilities (inc two 0-day).
This week, we analyze new espionage-driven campaigns related to the Lazarus/ZINC activity cluster.
We are closely following increased geopolitical tensions after the potential sabotage attacks to Nordstream pipelines in the Baltic sea.
Malware analyst 3xp0rt has uploaded a Lockbit 3 ransomware builder, allowing anyone to build executables for their own operation.
This week we report Emotet is still active. The DFIR Report describes an incident in May 2022 which began with
This week we analyze the latest campaign of the alleged Russian #threatactor TA505 and how it uses ServHelper and TeslaGun
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.