
Threat Intelligence Snapshot: Week 17, 2025
MFA Bypassed Using Stolen Azure Session Cookies | European Commission Releases First Draft of AI Act Guidelines For Consultation
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
MFA Bypassed Using Stolen Azure Session Cookies | European Commission Releases First Draft of AI Act Guidelines For Consultation
CVE Program Faces Funding Cutoff, Jeopardizing Vulnerability Coordination Infrastructure | Tariffs Update: EU Suspends US Tariffs For 90 Days, China
Ivanti Discloses Critical Zero-Day Vulnerability in Connect Secure Exploited by China-Linked UNC5221 | European Parliament Agrees To Delay Application Of
Multi-Stage Attack Targets Microsoft Teams Users with Malware and Remote Access Tools | European Financial Authorities Call For Vigilance Amid
IngressNightmare: Critical Unauthenticated RCE Flaws in Ingress NGINX Threaten Kubernetes Clusters | US Expands Trade Crackdown: Auto Sector Hit, Venezuela
Chinese Espionage Group UNC3886 Deploys Custom Backdoors on EoL Juniper Routers | Europol Says Organized Crime Accelerated By AI and
GitHub repositories used to distribute SmartLoader and Lumma Stealer | Yemen’s Houthis to resume attacks on Israeli ships
Urgent patches for actively exploited VMware zero-day | ENISA launches NIS360 to assess cyber maturity and criticality across NIS2 sectors
Lazarus Group Linked to EUR 1.4 Billion Bybit Cryptocurrency Heist | EU Publishes Cyber Blueprint To Strengthen Collective Cybersecurity
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilitieS | US signals efforts toward normalizing relations with Russia
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.