
Threat Intelligence Snapshot: Week 27, 2025
Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Russian GRU Campaign Targets European Companies In Logistics, Maritime and IT Sectors Over Ukraine Support – US Sanctions Russian Bulletproof

Dire Wolf Ransomware Surfaces, Targeting Worldwide Industries | Fragile Ceasefire In Israel – Iran Conflict, Security Situation Highly Volatile

EchoLeak Zero Click Vulnerability Enables Data Exfiltration From Microsoft 365 Copilot Without User Interaction | Tensions In the Middle East:

China-linked Espionage Campaigns Target Over 70 Organizations Worldwide | Italy’s Anti-Ransomware Strategy Bill Now Discussed In the Parliament

Global Spear-Phishing Campaign Targets Executives in Finance and Energy Sectors to Deploy NetBird | ISO Publishes New Standard On AI

APT41 Exploits Google Calendar in Global Espionage Operation | Trump Announces New EU Tariffs, Then Delays Them Until 9 July

Global Malvertising Campaign Impersonates Kling AI To Target Financial Institutions Including Italian Banks | EU Adopts Four Sets of New

China-Nexus APTs Exploit SAP NetWeaver (CVE-2025-31324) for Strategic Access to Critical Infrastructure | US Experts Find Rogue Communication Devices In

Panda Shop: A Chinese-Linked Smishing Infrastructure Operating at Scale | 19 Member States Still Have Not Fully Transposed the NIS2

Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal