
Weekly Intelligence Snapshot – Week 24, 2023
UNC3886 — a Chinese Cyberespionage group — is targeting defense, tech, and telecom organizations in the US and APAC.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

UNC3886 — a Chinese Cyberespionage group — is targeting defense, tech, and telecom organizations in the US and APAC.

Creators of the Ransomware-as-a-Service dubbed NoEscape are actively recruiting affiliates to spread this wide-functionality RaaS which allows for defense evasion.

Threat Actor “Spyboy” is selling software claiming to terminate AV and EDR processes of EDRs.

G7 Summit: Leaders prioritize supply chain resilience and fair trade practices.

Officials in multiple European countries were targeted by a newly discovered malicious firmware implant called “Horse Shell”.

The National Security Agency (NSA) and partner agencies have identified the infrastructure for Snake malware, a Russian cyberespionage tool, in

QuoIntelligence observed a new backdoor called “Durtmovoy” that is currently in development by “Durt Team”, a newly observed Russian threat

We track a Phishing campaign targeting SCADA system providers in the DACH region that delivers the Remcos Trojan. We analyze

Ransomware groups and APTs are resorting to Living-off-the-Land Binaries (LOLBINs) — legitimate software and tools preinstalled on infected systems.

As the use of ChatGPT rises, we analyze the current AI regulatory frameworks.
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue