Threat Snapshot 2 Blurring Boundaries 3 Vulnerability Intelligence 4 Stolen Access Credentials 6 Tips 7 27 Ransomware 5 Key Findings 1 1 https://internationalbanker.com/technology/key-implications-of-the-crowdstrike-outage/ 2 https://www.nemko.com/blog/ukrainian-surveillance-cameras-hacked#:~:text=The%20attack's%20sophistication%20was%20evident,everyday%20 devices%20into%20espionage%20tools 3 https://www.theregister.com/2024/03/04/germany_confirms_russia_leak_genuine/ 4 https://www.nytimes.com/2024/02/15/world/middleeast/us-cyberattack-iran-ship.html 5 https://www.akamai.com/blog/security-research/critical-linux-backdoor-xz-utils-discovered-what-to-know 6 https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/ 7 https://www.theregister.com/2024/12/13/doj_dpkr_fake_tech_worker_indictment/ 8 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/ 9 https://cyberscoop.com/as-many-as-165-companies-potentially-exposed-in-snowflake-related-attacks-mandiant-says/ 10 https://www.chainalysis.com/blog/crypto-crime-ransomware-victim-extortion-2025/ 11 https://www.infosecurity-magazine.com/news/law-enforcement-redline-meta/ 12 https://arstechnica.com/security/2024/05/breachforums-an-online-bazaar-for-stolen-data-seized-by-fbi/?utm_source=chatgpt.com 13 https://www.bleepingcomputer.com/news/security/unitedhealth-subsidiary-optum-hack-linked-to-blackcat-ransomware/ 14 https://www.cognyte.com/blog/geopolitical-conflict-hacktivism-threat-intelligence/ 15 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a 16 https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/ 17 https://therecord.media/cybervolk-india-hacktivists-russia-ransomware 18 https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf 19 https://jerrygamblin.com/2024/01/03/2023-cve-data-review/ 20 https://tuxcare.com/wp-content/uploads/2024/07/TuxCare-Report-3-Months-of-Kernel-CVEs.pdf 21 https://thehackernews.com/2024/04/researchers-identify-multiple-china.html 22 https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect- cve-2024-3400/ 23 https://www.fortiguard.com/psirt/FG-IR-24-015 24 https://statescoop.com/ransomware-los-angeles-county-superior-courts-closure/ 25 https://www.nationalcrimeagency.gov.uk/the-nca-announces-the-disruption-of-lockbit-with-operation-cronos 26 https://thehackernews.com/2024/08/fbi-shuts-down-dispossessor-ransomware.html 27 https://www.chainalysis.com/blog/crypto-crime-ransomware-victim-extortion-2025/ 28 https://www.bleepingcomputer.com/news/security/powerschool-hacker-claims-they-stole-data-of-62-million-students/ Notes Blurring Boundaries 3 Vulnerability Intelligence 4 Stolen Access Credentials 6 Tips 7 Ransomware 5 Key Findings 1 Threat Snapshot 2