
Weekly Intelligence Snapshot – Week 31, 2023
New Malware Alert: WikiLoader Targets Italian Organizations plus the main points of the European Sustainability Reporting Standards (ESRS) adopted this
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
New Malware Alert: WikiLoader Targets Italian Organizations plus the main points of the European Sustainability Reporting Standards (ESRS) adopted this
Mandiant has uncovered a supply chain compromise affecting US-based software solutions company JumpCloud. The intrusion — attributed to North Korean
QuoIntelligence analyzes the key points of the US’s National Cybersecurity Strategy Implementation Plan recently released by the Biden administration.
Researchers from Microsoft discovered a phishing campaign by the eCrime actor Storm-0978/RomCom targeting defense and government entities in Europe and
Major Spanish banks among specific targets for Neo_Net. We are tracking this Threat Actor on Telegram.
SentinelOne, Bitdefender & Elastic have reported on the emerging threat actor JokerSpy that targets enterprise MacOS devices with multistage spyware.
Pro-Russia Hacktivist group Anonymous Sudan attacked Microsoft Azure, disrupting services for two hours.
UNC3886 — a Chinese Cyberespionage group — is targeting defense, tech, and telecom organizations in the US and APAC.
Creators of the Ransomware-as-a-Service dubbed NoEscape are actively recruiting affiliates to spread this wide-functionality RaaS which allows for defense evasion.
Threat Actor “Spyboy” is selling software claiming to terminate AV and EDR processes of EDRs.
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.