
Threat Intelligence Snapshot: Week 26, 2024
Chinese Cyberespionage Groups Utilize Ransomware, StrelaStealer Malware Resurfaces | New EU Framework For Money Laundering
Explore our comprehensive archive organized by taxonomy. Discover a wealth of information categorized by subject, theme, or type to enhance your research and understanding.

Chinese Cyberespionage Groups Utilize Ransomware, StrelaStealer Malware Resurfaces | New EU Framework For Money Laundering

Scattered Spider Targets SaaS, Ivanti and VMware CVEs | Cyber Insurance Claims Hit Record, NATO To Increase Vigilance On Russian

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Operation Endgame Targets Major Droppers and Disrupts Global Malware Ecosystem | Houthis Threaten Maritime Security In The Mediterranean Sea

Grandoreiro Trojan Reemerges Targeting More Than 1,500 Banks Globally | Analyzing Impact Of EU Decision To Use Russian Frozen Assets

Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations

Operation Cronos: Unmasking and Crippling LockBit | Intelligence Agencies Warn Of Russia Hybrid Warfare Operations

New Ransomware Group Dubbed APT73 Shares Similarities with LockBit’s DLS | NIS2 Cybersecurity Directive Key Takeaways

Cheap Ransomware Tools Proliferating in the Underground | Chinese Espionage: New Cases In Germany, Growing Concern In Europe
Try searching our blog

Smishing Triad Expands Global PhaaS Infrastructure | US President Donald Trump Announces Deal With China Over Tariffs and Rare Earths

Underground Doxxing Campaign Disrupts Lumma Stealer Operations | EU Adopts 19th Package of Sanctions Against Russia, Targeting Energy, Shadow Fleet, Third-country Banks

The Quo Files are our special intelligence drops, deep-dives into stories we believe deserve more than a passing mention. They spotlight unique findings, from new threat actor tactics to critical geopolitical-cyber links, offering timely, high-value insights that go beyond our regular reporting.

F5 Discloses Intrusion by Nation-State Threat Actor into BIG-IP Development Systems | Netherlands Invokes Rare Emergency Law To Take Control of Chinese Chipmaker