
Weekly Intelligence Snapshot – Week 31, 2023
New Malware Alert: WikiLoader Targets Italian Organizations plus the main points of the European Sustainability Reporting Standards (ESRS) adopted this
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

New Malware Alert: WikiLoader Targets Italian Organizations plus the main points of the European Sustainability Reporting Standards (ESRS) adopted this

Mandiant has uncovered a supply chain compromise affecting US-based software solutions company JumpCloud. The intrusion — attributed to North Korean

QuoIntelligence analyzes the key points of the US’s National Cybersecurity Strategy Implementation Plan recently released by the Biden administration.

Researchers from Microsoft discovered a phishing campaign by the eCrime actor Storm-0978/RomCom targeting defense and government entities in Europe and

Major Spanish banks among specific targets for Neo_Net. We are tracking this Threat Actor on Telegram.

SentinelOne, Bitdefender & Elastic have reported on the emerging threat actor JokerSpy that targets enterprise MacOS devices with multistage spyware.

Pro-Russia Hacktivist group Anonymous Sudan attacked Microsoft Azure, disrupting services for two hours.

UNC3886 — a Chinese Cyberespionage group — is targeting defense, tech, and telecom organizations in the US and APAC.

Creators of the Ransomware-as-a-Service dubbed NoEscape are actively recruiting affiliates to spread this wide-functionality RaaS which allows for defense evasion.

Threat Actor “Spyboy” is selling software claiming to terminate AV and EDR processes of EDRs.
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal