
Threat Intelligence Snapshot: Week 18, 2025
Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive

MFA Bypassed Using Stolen Azure Session Cookies | European Commission Releases First Draft of AI Act Guidelines For Consultation

CVE Program Faces Funding Cutoff, Jeopardizing Vulnerability Coordination Infrastructure | Tariffs Update: EU Suspends US Tariffs For 90 Days, China

Ivanti Discloses Critical Zero-Day Vulnerability in Connect Secure Exploited by China-Linked UNC5221 | European Parliament Agrees To Delay Application Of

Multi-Stage Attack Targets Microsoft Teams Users with Malware and Remote Access Tools | European Financial Authorities Call For Vigilance Amid

IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela

Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and

GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships

Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors

Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure