
Threat Intelligence Snapshot: Week 4, 2025
Star Blizzard Shifts TTPs with WhatsApp Spear Phishing | Trump Revokes Executive Order Addressing AI Risks
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Star Blizzard Shifts TTPs with WhatsApp Spear Phishing | Trump Revokes Executive Order Addressing AI Risks

Fortigate Firewalls Zero-Day Vulnerability Resulted in Sensitive Data Breach | US Adopts Tougher Sanctions To Curb Russian Oil Supply

Mirai-based botnet exploits zero-day, Ivanti Secure Connect zero-days are actively exploited in the wild | US imposes sanctions on a

Attackers exploit DLink router vulnerabilities, Palo Alto Patch For Vulnerability In PAN OS | NATO To Boost Baltic Sea Presence

Malware designed to terminate Siemens engineering processes, Mirai targets Juniper SSR devices | Italy’s Data Protection Authority fines OpenAI for

Russian state-sponsored Earth Koshchei targets high-profile EU Orgs, Lazarus Group evolves its infection chain | ECB Calls for Stronger Bank

Deepfake Fraud Threatens Financial Institutions | Operation PowerOFF Shuts Down 27 DDoS Platforms | EU To Strengthen ENISA And Enforce

Golden Chickens New Malware tools: RevC2 and Venom Loader | ENISA Releases the First Ever Report On the State of

Chinese APT Group Targets Critical Sectors with New Malware and Advanced Techniques in Espionage Operations | Insurer Introduces Professional Liability

Hive0145 launches advanced Strela Stealer campaigns targeting Europe | ENISA Releases Technical Guidance For NIS2 Implementation
Try searching our blog

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet, Third-country Banks

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They spotlight unique findings, from new threat actor tactics to critical geopolitical-cyber links, offering timely, high-value insights that go beyond our regular reporting.

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker