
Weekly Intelligence Snapshot – Week 5
This week, read about Lazarus targeting users with malicious decoy documents by leveraging Windows Update Client and GitHub. The North
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
This week, read about Lazarus targeting users with malicious decoy documents by leveraging Windows Update Client and GitHub. The North
This week, we report on an old acquaintance striking with a new Unified Extensible Firmware Interface (UEFI) rootkit dubbed MoonBounce.
This week, we look at the recent attack on Ukrainian government websites, which further stoked already escalating tensions between Ukraine
This week, we cover Patch Tuesday. Microsoft addresses six zero-days and a wormable vulnerability, and Adobe and SAP address critical
The first edition of our Weekly Intelligence Summary of 2022 is here. It highlights Konni, a new variant of malware
Our declassified threat intelligence analysis on a APT28 spear phishing campaign delivering Zebrocy malware to target at least a government
You can find here the latest threat intelligence updates on the new BlackWater Malware campaign using the Beirut tragedy to
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.