
Threat Intelligence Snapshot: Week 37, 2025
Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference

Cloudflare Confirms Impact from Salesloft Drift Breach | Ursula von der Leyen’s Plane Hit By Suspected Russian GPS interference

Researchers Expose Zero-Day Clickjacking Flaws in Password Managers | European Postal Operators Halt US Parcel Shipments Over Tax Uncertainty

Long-Term Compromise of Cisco Devices by Russian APT Using CVE-2018-0171 | European Postal Operators Halt US Parcel Shipments Over Tax

RomCom Exploits WinRAR Zero-Day in Targeted Espionage Campaign | Norway Says Russian Threat Actor Likely Behind Dam Sabotage

Akira Ransomware Exploits SonicWall VPN for Initial Access | China Outsources Information Warfare Efforts To AI Companies

Ransomware Group Scattered Spider Targets US Organizations via VMware Infrastructure | The US and the EU Reach 15 Percent Tariff

Microsoft Reports Chinese State Actors Exploiting SharePoint Vulnerabilities | UK Government Plans Ransom Payment Ban

Emerging Ransomware-as-a-Service GLOBAL GROUP Featuring AI Driven Negotiation and Mobile-Friendly Affiliate Controls | ECB Publishes Guide On Banks Outsourcing Cloud

DoNot APT Group Conducts Sophisticated Cyber Espionage Against Southern European Governments | New Houthi Attack In Red Sea Kills Four,
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal