
Threat Intelligence Snapshot: Week 30, 2024
Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development

EstateRansomware’s exploits Veeam vulnerability, ServiceNow MID Server critical CVEs | Germany to remove Huawei and ZTE from 5G networks

Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation

TeamViewer Reports Intrusion, China-linked APT Velvet Ant Exploits Cisco Nexus | EU Imposes Duties on China-built EVs

Chinese Cyberespionage Groups Utilize Ransomware, StrelaStealer Malware Resurfaces | New EU Framework For Money Laundering

Scattered Spider Targets SaaS, Ivanti and VMware CVEs | Cyber Insurance Claims Hit Record, NATO To Increase Vigilance On Russian

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Grandoreiro Trojan Reemerges Targeting More Than 1,500 Banks Globally | Analyzing Impact Of EU Decision To Use Russian Frozen Assets
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure