
Threat Intelligence Snapshot: Week 09, 2024
Doppelgänger: Influence Operation Targets German Political Landscape | NIST Cybersecurity Framework 2.0 Points at Supply Chain and AI Risks
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Doppelgänger: Influence Operation Targets German Political Landscape | NIST Cybersecurity Framework 2.0 Points at Supply Chain and AI Risks
Global Law Enforcement Operation Successfully Disrupts LockBit Ransomware | AI Technologies To Fuel Disinformation Risks On 2024 Elections
Patch Tuesday: Microsoft Patches 73 Flaws, Three Zero-Days | US Joint Cyber Defense Collaborative Presents 2024 Priorities
AnyDesk Revoked Security-Related Certificates due to a Cyberattack | Governments Take Measures Against Commercial Spyware
UNC4990 Distributes Malicious Payloads | Back-Ups and Measures Mitigating Data Exfiltration Are Key To Avoid Ransom Payment
Decoding 2024’s Threat Landscape: Cyber extortion to take innovative forms, AI at a crossroads, and geopolitics increasingly shaping the threat
North Korean Threat Actor Gathering Strategic Intelligence | GDPR Enforcement: France’s Fines Amazon EUR 32 Million For Employee Monitoring
Our investigation uncovers a previously unreported and undetected variant of the WIREFIRE web shell, a Python-based implant found in Ivanti
Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze
Insights from Microsoft’s Patch Tuesday show critical vulnerabilities don’t require authentication | Decoding the Cyber Insurance Maze
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.