
Threat Intelligence Snapshot: Week 38, 2025
Storm-2603 Exploits SharePoint Vulnerabilities, Shai-Hulud Supply Chain Attack Expands to CrowdStrike npm Ecosystem | UN Commission Concludes Isreael is Commiting
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Storm-2603 Exploits SharePoint Vulnerabilities, Shai-Hulud Supply Chain Attack Expands to CrowdStrike npm Ecosystem | UN Commission Concludes Isreael is Commiting

Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference

Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference

Researchers Expose Zero-Day Clickjacking Flaws in Password Managers | European Postal Operators Halt US Parcel Shipments Over Tax Uncertainty

Long-Term Compromise of Cisco Devices by Russian APT Using CVE-2018-0171 | European Postal Operators Halt US Parcel Shipments Over Tax

RomCom Exploits WinRAR Zero-Day in Targeted Espionage Campaign | Norway Says Russian Threat Actor Likely Behind Dam Sabotage

Akira Ransomware Exploits SonicWall VPN for Initial Access | China Outsources Information Warfare Efforts To AI Companies

Ransomware Group Scattered Spider Targets US Organizations via VMware Infrastructure | The US and the EU Reach 15 Percent Tariff

Microsoft Reports Chinese State Actors Exploiting SharePoint Vulnerabilities | UK Government Plans Ransom Payment Ban

Emerging Ransomware-as-a-Service GLOBAL GROUP Featuring AI Driven Negotiation and Mobile-Friendly Affiliate Controls | ECB Publishes Guide On Banks Outsourcing Cloud
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure