
Threat Intelligence Snapshot: Week 36, 2024
new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

new Ransomware-as-a-Service, Cicada 3301, exploits ESXi systems | SANS Institute releases a critical infrastructure strategy guide

BlackByte Ransomware Exploits Recently Patched VMware ESXi Vulnerability in Latest Attack | Tensions Soar Between Israel and Hezbollah, Continued Targeting

RansomHub unveils a new tool designed to disable EDR systems | Singapore updates its OT cybersecurity blueprint amidst rising threats

‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI

‘Sitting Ducks’ Attacks Lead to Large-Scale Domain Hijacking | Germany’s BaFin Publishes Guidance for Banks on AI

Security Flaw in Proofpoint’s Email Routing System, Ransomware Groups Exploit ESXi CVE | European Artificial Intelligence Act Comes Into Force

Microsoft Defender Vulnerability Exploited, APT41 Targets Shipping and Tech Sectors | Italy Unveils Strategic Plan For AI Development

EstateRansomware’s exploits Veeam vulnerability, ServiceNow MID Server critical CVEs | Germany to remove Huawei and ZTE from 5G networks

Kimsuky Uses HappyDoor Backdoor, Polyfill Supply Chain Attack Affects Over 380,000 Hosts | US Ruling Threatens Cybersecurity Regulation

TeamViewer Reports Intrusion, China-linked APT Velvet Ant Exploits Cisco Nexus | EU Imposes Duties on China-built EVs
Try searching our blog

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet, Third-country Banks

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They spotlight unique findings, from new threat actor tactics to critical geopolitical-cyber links, offering timely, high-value insights that go beyond our regular reporting.

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker