
Threat Intelligence Snapshot: Week 18, 2025
Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive

MFA Bypassed Using Stolen Azure Session Cookies | European Commission Releases First Draft of AI Act Guidelines For Consultation

CVE Program Faces Funding Cutoff, Jeopardizing Vulnerability Coordination Infrastructure | Tariffs Update: EU Suspends US Tariffs For 90 Days, China

Ivanti Discloses Critical Zero-Day Vulnerability in Connect Secure Exploited by China-Linked UNC5221 | European Parliament Agrees To Delay Application Of

Multi-Stage Attack Targets Microsoft Teams Users with Malware and Remote Access Tools | European Financial Authorities Call For Vigilance Amid

IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela

Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and

GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships

Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors

Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity
Try searching our blog

The Gentlemen Accelerates Ransomware Operations Through Scalable Affiliate Model | Russia Threatens European Drone Producers, Publishes Addresses Online

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue