
Weekly Intelligence Snapshot – Week 38
Malware analyst 3xp0rt has uploaded a Lockbit 3 ransomware builder, allowing anyone to build executables for their own operation.
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Malware analyst 3xp0rt has uploaded a Lockbit 3 ransomware builder, allowing anyone to build executables for their own operation.

This week we report Emotet is still active. The DFIR Report describes an incident in May 2022 which began with

This week we analyze the latest campaign of the alleged Russian #threatactor TA505 and how it uses ServHelper and TeslaGun

This week we focus on Mobile Banking Trojan Ermac, aimed at stealing credentials from financial and Cryptocurrency applications.

This week read how LockBit suffered a DDoS attack following its #ransomware attack on Entrust – not the first time

In this week’s summary our Cyber news features the collaboration of the Microsoft Threat Intelligence Center (MSTIC), Google Threat Analysis

Our Cyber news this week majors on Microsoft’s recent Patch Tuesday Vulnerability update which deals with 121 flaws.

We report on SentinelOne’s findings on LockBit’s latest method which employs the MpCmdRun.exe executable, which is extremely difficult to detect.

This week we cover a spearphishing campaign attributed to Evilnum, which is targeting DeFi platforms in Europe.

QuoIntelligence analyzes the consequences of China’s strategy for critical industries particularly exposed to cyber espionage as well as its effects
Try searching our blog

Russian-Speaking eCrime Threat Actor Leverages Commercial AI Services to Compromise Over 600 FortiGate Devices | US Supreme Court Strikes Down Trump’s Global Tariffs

UNC6201 Exploiting Zero-day in Dell RecoverPoint to Achieve Persistent Access | Wave of Sabotage Acts Target Italian Railway Network Amid Winter Olympics

Exchange URL Rule Failure Sparks Mass Email Quarantine, ZeroDayRAT Spyware, SSH Botnets and DPRK LinkedIn Fraud Expand Global Threat Landscape | EU Launches 20th Russia Sanctions Package

APT28 Targeting Central and Eastern Europe through CVE‑2026‑21509 Exploitation | UK Opens First Investigations Over Breach Of Cyber Sanctions