
Threat Intelligence Snapshot: Week 47, 2025
Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Global WrtHug Campaign Targets ASUS Routers, Over 50,000 Devices Compromised | European Commission Unveils New Digital Package Addressing AI and

Researchers Find APT Campaign Targeted Cisco And Citrix Vulnerabilities Before Disclosure | Germany Links Belgium Drone Incidents To Frozen Russian

New AI-Powered Malware Families Leveraging LLMs for Self-Modifying Code, Evasion, and Data Theft | European Commission Authorizes Coalition of EU

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet,

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control

LockBit, DragonForce, and Qilin Forge Alliance to Amplify Global Ransomware Operations | Israel and Hamas Signed Off On First Phase

New Klopatra Android Banking Trojan Targets The Financial Sector Across Spain And Italy | Yemen’s Houthis Attack Dutch-flagged Ship In

IRGC-aligned APT Targets Defense, Telecom, and Aviation Sectors across Western Europe | Italy Becomes First EU Member State To Adopt

Storm-2603 Exploits SharePoint Vulnerabilities, Shai-Hulud Supply Chain Attack Expands to CrowdStrike npm Ecosystem | UN Commission Concludes Isreael is Commiting
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal