
Weekly Intelligence Snapshot – Week 01
New year, same Cyber targets. The relentless onslaught on European financial and insurance institutions continues as Security Joes discovers a
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

New year, same Cyber targets. The relentless onslaught on European financial and insurance institutions continues as Security Joes discovers a

In its latest campaign, the Lazarus sub-group BlueNoroff has been operating an infrastructure of over 70 domains impersonating venture capital

The malwareHunterTeam posted a warning about “Photo.apk” – an Android executable which QuoIntelligence determined might announce the imminent arrival

Microsoft releases its Patch Tuesday update with two Zero-Day vulnerabilities, one exploited in Malware distribution.
Regulatory landscapes more complex as

This week we highlight Telecommunication and business process outsourcing companies hit by SIM swapping operations. In geopolitics, we look at

China-nexus group uses new Malware families to infect USBs for Espionage.

Our tracking of the Mustang Panda group reveals a different DLL sideloading technique from those seen this year.

Pro-Russia hacktivist group From Russia With Love has been deploying Somnia Ransomware in Ukraine since spring 2022. But the #Malware

In our latest Weekly #Intelligence Summary: ASEC Analysis Team has seen LockBit 3.0 Ransomware deployed through Amadey Bot, an Infostealer

Microsoft reports the RaspberryRobin worm is now part of a malware ecosystem and one of the largest active malware distribution
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal