
Weekly Intelligence Snapshot – Week 33
In this week’s summary our Cyber news features the collaboration of the Microsoft Threat Intelligence Center (MSTIC), Google Threat Analysis
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

In this week’s summary our Cyber news features the collaboration of the Microsoft Threat Intelligence Center (MSTIC), Google Threat Analysis

Our Cyber news this week majors on Microsoft’s recent Patch Tuesday Vulnerability update which deals with 121 flaws.

We report on SentinelOne’s findings on LockBit’s latest method which employs the MpCmdRun.exe executable, which is extremely difficult to detect.

This week we cover a spearphishing campaign attributed to Evilnum, which is targeting DeFi platforms in Europe.

QuoIntelligence analyzes the consequences of China’s strategy for critical industries particularly exposed to cyber espionage as well as its effects

QuoIntelligence is tracking activity related to the use of fake job offers and job applications to compromise companies for monetary

QuoIntelligence gathered and processed the different Microsoft product updates in order to provide a clear overview of the different topics

After Kaspersky ICS CERT published their findings of an active shadowPad infection, QuoIntelligence analyzed the activity further in our report.

Quointelligence is analyzing the use of Follina vulnerability in the campaign targeting entities in Ukraine reported by the CERT-UA, allegedly

We analyzed the encryption software samples used in HelloXD’s Ransomware operation and provide an update of the latest legislation regarding
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal