
Threat Intelligence Snapshot: Week 51, 2023
In this Week’s Intelligence Update: Newly Discovered SMTP Smuggling Attack | Geopolitical Implications of Iranian Petrol Station Cyberattack
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

In this Week’s Intelligence Update: Newly Discovered SMTP Smuggling Attack | Geopolitical Implications of Iranian Petrol Station Cyberattack

Microsoft released Patch Tuesday security update with fixes for 34 vulnerabilities (4 critical, one Zero-Day.

Forescout Vedere Labs uncovers 21 Vulnerabilities in Sierra Wireless AirLink cellular routers — a popular OT/IoT Router.

Okta Breach Update: All Customer Support System Users Affected | EU Green Measures – How Will They Affect Your Business?

AI Regulation — Where Do Germany, Italy, and France Stand? | North Korea Targets IT Job Seekers |

New Malicious Malware Attacking Italian Users | Latest Microsoft Patch Tuesday | Rising Trend in Cyberattacks Against European Infrastructure

IBM X-Force researchers discovered a new malware variant from the threat group known as Gootloader.

Microsoft releases report on Threat Actor Octo Tempest, described as “one of the most dangerous financial crime groups”, using Social

Okta suffered a breach in its support management system. Threat Actors used stolen creds to view support files uploaded by

Updates on the geopolitical and cyber threat landscapes from the Hamas-Israel crisis. Plus a look at the PureLogs stealer malware
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal