Threat Intelligence Snapshot: Week 20, 2025
China-Nexus APTs Exploit SAP NetWeaver (CVE-2025-31324) for Strategic Access to Critical Infrastructure | US Experts Find Rogue Communication Devices In...
Mercury delivers Predictive Threat Intelligence powered by its AI-technology, supervised by a team of talented analysts, providing real-time insights into cyber and geopolitical risks. Our AI-driven analytics anticipate threats before they materialize, offering client-relevant intelligence reporting, automated risk scoring, and tailored threat insights.
Mercury maintains 22,000+ intelligence tickets analyzed by our Intelligence Analysts for company relevance, simplifying industry-specific insights. Receive alerts on critical vulnerabilities and potential attacks ensuring timely delivery of targeted threat information
Mercury offers 24/7 access to our curated Knowledge Base, customizable searches, ad-hoc reports, and on-demand support from Intelligence Analysts enhancing your cyber defense center with expertise and additional staffing when needed
Mercury offers intuitively presented, vetted Finished Intelligence allowing analysts to focus on operational tasks. It features mapped ATT&CK techniques, validated Indicators of Compromise, and suggestions to close security gaps
Raw intelligence processed
Information sources
Relevancy scoring is based on your location, industry, and technology stack
Information and source reliability ratings increase the confidence of insights
Access our Intelligence Analysts’ complete Knowledge Base and leverage on our API integration
At QuoIntelligence, our mission is to deliver actionable threat intelligence that helps organizations make informed security decisions. But don’t just take our word for it: hear directly from the companies and security teams who rely on our services.
Source: Gartner.com
China-Nexus APTs Exploit SAP NetWeaver (CVE-2025-31324) for Strategic Access to Critical Infrastructure | US Experts Find Rogue Communication Devices In...
Panda Shop: A Chinese-Linked Smishing Infrastructure Operating at Scale | 19 Member States Still Have Not Fully Transposed the NIS2...
Wormable Zero Click RCE Vulnerabilities in Apple AirPlay Putting Billions of Devices at Risk | Iberian Peninsula Hit By Massive...