
Threat Intelligence Snapshot: Week 50, 2024
Deepfake Fraud Threatens Financial Institutions | Operation PowerOFF Shuts Down 27 DDoS Platforms | EU To Strengthen ENISA And Enforce
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Deepfake Fraud Threatens Financial Institutions | Operation PowerOFF Shuts Down 27 DDoS Platforms | EU To Strengthen ENISA And Enforce

Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of

Chinese APT Group Targets Critical Sectors with New Malware and Advanced Techniques in Espionage Operations | Insurer Introduces Professional Liability

Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation

Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation

SharePoint vulnerability CVE-2024-38094 exploited for credential theft | US elections to reshape global power dynamics

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End

CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure