
Threat Intelligence Snapshot: Week 8, 2025
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek
StargazerGoblin exploits #GitHub to distribute Lumma Stealer | taly’s Data Protection Authority demands answers from DeepSeek
Star Blizzard Shifts TTPs with WhatsApp Spear Phishing | Trump Revokes Executive Order Addressing AI Risks
Fortigate Firewalls Zero-Day Vulnerability Resulted in Sensitive Data Breach | US Adopts Tougher Sanctions To Curb Russian Oil Supply
Mirai-based botnet exploits zero-day, Ivanti Secure Connect zero-days are actively exploited in the wild | US imposes sanctions on a
Attackers exploit DLink router vulnerabilities, Palo Alto Patch For Vulnerability In PAN OS | NATO To Boost Baltic Sea Presence
Malware designed to terminate Siemens engineering processes, Mirai targets Juniper SSR devices | Italy’s Data Protection Authority fines OpenAI for
Russian state-sponsored Earth Koshchei targets high-profile EU Orgs, Lazarus Group evolves its infection chain | ECB Calls for Stronger Bank
Try searching our blog
DoNot APT Group Conducts Sophisticated Cyber Espionage Against Southern European Governments | New Houthi Attack In Red Sea Kills Four, 15 Missing, Sinking Vessel
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran