
Threat Intelligence Snapshot: Week 49, 2024
Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of
Chinese APT Group Targets Critical Sectors with New Malware and Advanced Techniques in Espionage Operations | Insurer Introduces Professional Liability
Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation
Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation
SharePoint vulnerability CVE-2024-38094 exploited for credential theft | US elections to reshape global power dynamics
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
CISA Warns of Active Exploitation of Critical FortiOS RCE Vulnerability | US Deputy National Security Advisor Urges Insurers To End
Rhadamanthys Stealer Introduces Innovative AI-Driven Features | Regional Tensions in the Middle East At Their Highest Point Since the Beginning
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.