
Threat Intelligence Snapshot: Week 20, 2024
Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations

Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations

New Ransomware Group Dubbed APT73 Shares Similarities with LockBit’s DLS | NIS2 Cybersecurity Directive Key Takeaways

Cheap Ransomware Tools Proliferating in the Underground | Chinese Espionage: New Cases In Germany, Growing Concern In Europe

Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains

Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains

Insights on Backdoor in Commonly Used XZ Utils Library | Taiwan Earthquake Raises Concerns Over Global SupplyChains

Large-Scale StrelaStealer Campaign Targets Europe | Russia-Ukraine Conflict Is Likely Far From End Resulting in Continued Instability

Red Teaming Malicious Use Cases for AI | Global Supply Chains Facing Growing Geopolitical Risks

QuoIntelligence analyzes Microsoft’s Patch Tuesday security update | key elements of the landmark EU’s AI Act
Try searching our blog

CrowdStrike Catches Insider Feeding Information Scattered Lapsus$ Hunters Collective | German Bundestag Passes Law Implementing NIS2 Directive

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and Cybersecurity Rules

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian Assets Dispute

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU Countries To Build Sovereign Digital Infrastructure