
Threat Intelligence Snapshot: Week 39, 2024
North Korean IT Workers Exploit Remote Employment for Cyber Operations and Revenue Generation | European Parliament Publishes Proposal on AI
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.
North Korean IT Workers Exploit Remote Employment for Cyber Operations and Revenue Generation | European Parliament Publishes Proposal on AI
Ransomware groups using Microsoft Azure tools like Storage Explorer and AzCopy | Investigation reveals Chinese-made port cranes with backdoor modems
Researchers Unintentionally Gained Administrative Access To Mobi WHOIS Server After Purchasing Decommissioned Domain For Vulnerability Testing | Poland Thwarts Cyber
new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide
BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting
RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI
Security Flaw in Proofpoint’s Email Routing System, Ransomware Groups Exploit ESXi CVE | European Artificial Intelligence Act Comes Into Force
Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development
Try searching our blog
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof Hosting Provider Aeza Group For Supporting Ransomware And Cybercrime
Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile
EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East: Countries Prepare Evacuations of Citizens In Israel and Iran
This first article in a three-part series explores Russia’s model of outsourcing cyber operations to non-state actors. Drawing on leaks, indictments, and intelligence sources, the study analyzes how Russia leverages private companies, hacktivist collectives, and eCrime groups to expand and strengthen its cyber capabilities.