Category: Threat Intelligence
Romanian ‘Swatting’ Ring Leader Sentenced in Washington After Multi-Year Threat Campaign Targeting U.S. Government and Institutions
ROBLOX ACCOUNT THEFT RING DISRUPTED: UKRAINIAN AUTHORITIES DETAIN GROUP LINKED TO 610,000 COMPROMISED ACCOUNTS AND CRYPTOCURRENCY RESALE NETWORKS
MICROSOFT TEAMS IMPERSONATION CAMPAIGN: UNC6692 DEPLOYS “SNOWBELT” BACKDOOR TO BREACH ENTERPRISE NETWORKS THROUGH SOCIAL ENGINEERING AND MALICIOUS EXTENSIONS
CHINA-LINKED PHISHING OPERATIONS TARGET JOURNALISTS AND DIASPORA ACTIVISTS: “GLITTER CARP” AND “SEQUIN CARP” CAMPAIGNS DEPLOY 100+ MALICIOUS DOMAINS IN TRANSNATIONAL REPRESSION MODEL
CISA KEV UPDATE: ACTIVE EXPLOITATION CONFIRMED FOR CONNECTWISE SCREENCONNECT PATH TRAVERSAL AND MICROSOFT WINDOWS PROTECTION FAILURE
GUNFIRE BREACH AT WHITE HOUSE CORRESPONDENTS’ DINNER: ARMED SUSPECT SUBDUED WITHIN SECONDS AS PRESIDENT DONALD J. TRUMP, FIRST LADY, AND VICE PRESIDENT ARE EVACUATED FROM ACTIVE THREAT ZONE
ICS ALERT: Cybersecurity and Infrastructure Security Agency EXPANDS KNOWN EXPLOITED VULNERABILITIES CATALOG WITH FOUR ACTIVELY TARGETED FLAWS ACROSS ENTERPRISE AND NETWORK DEVICES
MOBILE BASE STATION SPOOFING OPERATION DISRUPTS MILLIONS OF CONNECTIONS IN CANADA’S FIRST SMS BLASTER CASE
ADT DATA EXPOSURE INCIDENT IMPACTS CUSTOMER RECORDS AS CRIMINAL CLAIMS SURFACE AROUND LARGE-SCALE DATA THEFT
SCATTERED SPIDER-ASSOCIATED ACTOR PLEADS GUILTY IN $8 MILLION CRYPTO THEFT CAMPAIGN: SOCIAL ENGINEERING, SMISHING, AND ENTERPRISE ACCOUNT TAKEOVERS DRIVE MULTI-SECTOR BREACHES
DISTRIBUTED DENIAL-OF-SERVICE (DDOS) CAMPAIGN TARGETS BLUESKY INFRASTRUCTURE: PLATFORM REPORTS SUSTAINED TRAFFIC FLOODING ACROSS CORE APPLICATION SYSTEMS
THIRD-PARTY AI TOOL BREACH CASCADES INTO VERCEL ENVIRONMENT COMPROMISE: TOKEN EXPOSURE AND WORKSPACE TAKEOVER TRIGGER SUPPLY CHAIN RISK
CRITICAL ICS ALERT: ANVIZ DEVICE ECOSYSTEM EXPOSED TO HIGH-SEVERITY VULNERABILITIES WITH FULL SYSTEM COMPROMISE POTENTIAL
CYBER-ENABLED CARGO THEFT OPERATIONS DEPLOY MULTI-LAYER REMOTE ACCESS AND CERTIFICATE SIGNING TO BYPASS DEFENSES
PLC BREACH OPERATIONS — IRAN-AFFILIATED APT CAMPAIGN TARGETS U.S. CRITICAL INFRASTRUCTURE THROUGH DIRECT OT SYSTEM MANIPULATION
LEAK BAZAAR EMERGENCE — DATA PROCESSING SERVICES TARGET RANSOMWARE STOCKPILES FOR SECONDARY MONETIZATION
GOVERNANCE TAKEOVER EXPLOIT: $280 MILLION DRAINED FROM DRIFT PROTOCOL IN SUSPECTED DPRK-ALIGNED OPERATION
LEAK BAZAAR EMERGENCE — RANSOMWARE DATA MONETIZATION SHIFTS FROM EXTORTION TO STRUCTURED EXPLOITATION PIPELINES
AXIOS SUPPLY CHAIN BREACH — MALICIOUS NPM RELEASE DELIVERS REMOTE ACCESS TROJAN ACROSS GLOBAL DEV PIPELINES
CISA KEV ALERT — ACTIVE EXPLOITATION OF CITRIX NETSCALER VULNERABILITY EXPANDS ATTACK SURFACE ACROSS ENTERPRISE EDGE SYSTEMS
KEV CATALOG EXPANSION — F5 BIG-IP REMOTE CODE EXECUTION VULNERABILITY ADDED AFTER ACTIVE EXPLOITATION CONFIRMED
CISA CAPABILITY COLLAPSE — FEDERAL SHUTDOWN FORCES CYBER DEFENSE INTO REACTIVE MODE AS WORKFORCE DROPS AND SYSTEMIC RISK EXPANDS
AI SUPPLY CHAIN COMPROMISE: MALICIOUS LITELLM PACKAGES ENABLE CREDENTIAL THEFT AND PERSISTENT ACCESS ACROSS CLOUD ENVIRONMENTS
SUPPLY CHAIN BREACH EXPANDS — MARQUIS SOFTWARE INCIDENT EXPOSES 670K+ RECORDS ACROSS BANKING NETWORKS
Suspicious Activity Detected on FBI Surveillance Network Triggers Federal Cybersecurity Investigation
Phobos Ransomware Operator Pleads Guilty After Global Extortion Campaign Targeted Over 1,000 Organizations
Global Law Enforcement Disrupts Tycoon 2FA Phishing Platform Used to Breach Hospitals, Schools, and Corporate Accounts
North Korean Threat Actor Deploys Deepfake Zoom Ruse and ClickFix Malware in Targeted Crypto Executive Intrusion
CISA Orders Federal Agencies to Remove End-of-Life Network Devices Amid Escalating Exploitation Campaigns
THE POISONED PIPELINE: Russian-Linked Actors Weaponize Blender Files to Breach Game and Animation Studios
THE PASSWORD PLAGUE: Microsoft Confirms Surge in Identity Attacks Driven by Leaked Credentials and Social Engineering Warfare
WHEN ALLIES TURN SILENT: Chinese APT ‘Jewelbug’ Breaches Russian IT Firm in Covert Supply-Chain Operation
Chinese-Linked Hackers Breach Major U.S. Law Firm via Zero-Day Exploit Targeting Attorney Email Accounts
Hunters International Ransomware Gang Claims to Shut Down — But Experts Say It’s Just Another Rebrand
