
Threat Intelligence Snapshot: Week 38, 2025
Storm-2603 Exploits SharePoint Vulnerabilities, Shai-Hulud Supply Chain Attack Expands to CrowdStrike npm Ecosystem | UN Commission Concludes Isreael is Commiting
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Storm-2603 Exploits SharePoint Vulnerabilities, Shai-Hulud Supply Chain Attack Expands to CrowdStrike npm Ecosystem | UN Commission Concludes Isreael is Commiting

Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference

Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference

Researchers Expose Zero-Day Clickjacking Flaws in Password Managers | European Postal Operators Halt US Parcel Shipments Over Tax Uncertainty

Long-Term Compromise of Cisco Devices by Russian APT Using CVE-2018-0171 | European Postal Operators Halt US Parcel Shipments Over Tax

RomCom Exploits WinRAR Zero-Day in Targeted Espionage Campaign | Norway Says Russian Threat Actor Likely Behind Dam Sabotage

Akira Ransomware Exploits SonicWall VPN for Initial Access | China Outsources Information Warfare Efforts To AI Companies

Ransomware Group Scattered Spider Targets US Organizations via VMware Infrastructure | The US and the EU Reach 15 Percent Tariff

Microsoft Reports Chinese State Actors Exploiting SharePoint Vulnerabilities | UK Government Plans Ransom Payment Ban

Emerging Ransomware-as-a-Service GLOBAL GROUP Featuring AI Driven Negotiation and Mobile-Friendly Affiliate Controls | ECB Publishes Guide On Banks Outsourcing Cloud
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue