
Threat Intelligence Snapshot: Week 7, 2025
Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Chinese state-sponsored Salt Typhoon exploits Cisco router vulnerabilities | Eurosystem updates the TIBER-EU framework to align with DORA

New AsyncRAT campaign abuses cloud services for malware delivery | Italy’s Data Protection Agency blocks access to DeepSeek

StargazerGoblin exploits #GitHub to distribute Lumma Stealer | taly’s Data Protection Authority demands answers from DeepSeek

Star Blizzard Shifts TTPs with WhatsApp Spear Phishing | Trump Revokes Executive Order Addressing AI Risks

Fortigate Firewalls Zero-Day Vulnerability Resulted in Sensitive Data Breach | US Adopts Tougher Sanctions To Curb Russian Oil Supply

Mirai-based botnet exploits zero-day, Ivanti Secure Connect zero-days are actively exploited in the wild | US imposes sanctions on a

Attackers exploit DLink router vulnerabilities, Palo Alto Patch For Vulnerability In PAN OS | NATO To Boost Baltic Sea Presence

Malware designed to terminate Siemens engineering processes, Mirai targets Juniper SSR devices | Italy’s Data Protection Authority fines OpenAI for

Russian state-sponsored Earth Koshchei targets high-profile EU Orgs, Lazarus Group evolves its infection chain | ECB Calls for Stronger Bank

Deepfake Fraud Threatens Financial Institutions | Operation PowerOFF Shuts Down 27 DDoS Platforms | EU To Strengthen ENISA And Enforce
Try searching our blog

Famous Chollima Abused npm Dependency Chaining to Deliver OtterCookie and Install SSH Backdoors | Italian National Cybersecurity Agency Publishes Resolution on NIS2 Directive Compliance
Anthropic’s Mythos Preview can reportedly discover and exploit software vulnerabilities autonomously. But the claims remain unverified, and the real challenge is operational: accelerating patch cycles, automating incident response, and preparing for disclosure volumes that manual processes cannot absorb. We assess what organizations need to do now.

Iranian-Linked Threat Actors Target Programmable Logic Controllers Across US Critical Infrastructure | US-Iran Ceasefire Falters Within Hours as Lebanon Death Toll Mounts and Gulf Strikes Continue

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack | EU Parliament Adopts Position On AI Regulation Proposal