
Threat Intelligence Snapshot: Week 15, 2025
Ivanti Discloses Critical Zero-Day Vulnerability in Connect Secure Exploited by China-Linked UNC5221 | European Parliament Agrees To Delay Application Of
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Ivanti Discloses Critical Zero-Day Vulnerability in Connect Secure Exploited by China-Linked UNC5221 | European Parliament Agrees To Delay Application Of
Multi-Stage Attack Targets Microsoft Teams Users with Malware and Remote Access Tools | European Financial Authorities Call For Vigilance Amid
IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela
Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors
Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek
Try searching our blog
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.
China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament
Global Spear-Phishing Campaign Targets Executives in Finance and Energy Sectors to Deploy NetBird | ISO Publishes New Standard On AI Impact Assessment