
Threat Intelligence Snapshot: Week 11, 2025
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors
Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek
StargazerGoblin exploits #GitHub to distribute Lumma Stealer | taly’s Data Protection Authority demands answers from DeepSeek
Star Blizzard Shifts TTPs with WhatsApp Spear Phishing | Trump Revokes Executive Order Addressing AI Risks
Fortigate Firewalls Zero-Day Vulnerability Resulted in Sensitive Data Breach | US Adopts Tougher Sanctions To Curb Russian Oil Supply
Mirai-based botnet exploits zero-day, Ivanti Secure Connect zero-days are actively exploited in the wild | US imposes sanctions on a
Try searching our blog
Global Malvertising Campaign Impersonates Kling AI To Target Financial Institutions Including Italian Banks | EU Adopts Four Sets of New Russia Sanctions
China-Nexus APTs Exploit SAP NetWeaver (CVE-2025-31324) for Strategic Access to Critical Infrastructure | US Experts Find Rogue Communication Devices In Inverters Produced In China
Panda Shop: A Chinese-Linked Smishing Infrastructure Operating at Scale | 19 Member States Still Have Not Fully Transposed the NIS2 Directive
Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive Power Outage, No Signs of Cyberattack So Far