
Threat Intelligence Snapshot: Week 15, 2026
Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On

TeamPCP Expands Supply Chain Campaign with litellm Compromise on PyPI | Middle East Conflict Weekly Update: Military, Diplomatic and Energy

Update In US-Israel War With Iran: Escalation Against Energy Facilities, Destructive Attack and Multi-Actor Espionage Surge In Cyber Domain

US-Israel War With Iran Escalates With Increasing Attacks Against Vessels and Energy Infrastructure In the Gulf | Iranian MOIS Cyber

US and Israeli Attacks Against Iran Trigger Regional Escalation, Disrupting Strategic Sectors | Iran-Linked Cyber Operations During the Current Escalation:

Russian-Speaking eCrime Threat Actor Leverages Commercial AI Services to Compromise Over 600 FortiGate Devices | US Supreme Court Strikes Down

UNC6201 Exploiting Zero-day in Dell RecoverPoint to Achieve Persistent Access | Wave of Sabotage Acts Target Italian Railway Network Amid

Exchange URL Rule Failure Sparks Mass Email Quarantine, ZeroDayRAT Spyware, SSH Botnets and DPRK LinkedIn Fraud Expand Global Threat Landscape

APT28 Targeting Central and Eastern Europe through CVE‑2026‑21509 Exploitation | UK Opens First Investigations Over Breach Of Cyber Sanctions
Try searching our blog
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal

TeamPCP Expands Supply Chain Campaign with litellm Compromise on PyPI | Middle East Conflict Weekly Update: Military, Diplomatic and Energy Developments