Threat
Snapshot 2
Blurring
Boundaries 3
Vulnerability
Intelligence 4
Stolen Access
Credentials 6
Tips
7
27
Ransomware
5
Key
Findings 1
1 https://internationalbanker.com/technology/key-implications-of-the-crowdstrike-outage/
2 https://www.nemko.com/blog/ukrainian-surveillance-cameras-hacked#:~:text=The%20attack's%20sophistication%20was%20evident,everyday%20
devices%20into%20espionage%20tools
3 https://www.theregister.com/2024/03/04/germany_confirms_russia_leak_genuine/
4 https://www.nytimes.com/2024/02/15/world/middleeast/us-cyberattack-iran-ship.html
5 https://www.akamai.com/blog/security-research/critical-linux-backdoor-xz-utils-discovered-what-to-know
6 https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/
7 https://www.theregister.com/2024/12/13/doj_dpkr_fake_tech_worker_indictment/
8 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/
9 https://cyberscoop.com/as-many-as-165-companies-potentially-exposed-in-snowflake-related-attacks-mandiant-says/
10 https://www.chainalysis.com/blog/crypto-crime-ransomware-victim-extortion-2025/
11 https://www.infosecurity-magazine.com/news/law-enforcement-redline-meta/
12 https://arstechnica.com/security/2024/05/breachforums-an-online-bazaar-for-stolen-data-seized-by-fbi/?utm_source=chatgpt.com
13 https://www.bleepingcomputer.com/news/security/unitedhealth-subsidiary-optum-hack-linked-to-blackcat-ransomware/
14 https://www.cognyte.com/blog/geopolitical-conflict-hacktivism-threat-intelligence/
15 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a
16 https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/
17 https://therecord.media/cybervolk-india-hacktivists-russia-ransomware
18 https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf
19 https://jerrygamblin.com/2024/01/03/2023-cve-data-review/
20 https://tuxcare.com/wp-content/uploads/2024/07/TuxCare-Report-3-Months-of-Kernel-CVEs.pdf
21 https://thehackernews.com/2024/04/researchers-identify-multiple-china.html
22 https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-
cve-2024-3400/
23 https://www.fortiguard.com/psirt/FG-IR-24-015
24 https://statescoop.com/ransomware-los-angeles-county-superior-courts-closure/
25 https://www.nationalcrimeagency.gov.uk/the-nca-announces-the-disruption-of-lockbit-with-operation-cronos
26 https://thehackernews.com/2024/08/fbi-shuts-down-dispossessor-ransomware.html
27 https://www.chainalysis.com/blog/crypto-crime-ransomware-victim-extortion-2025/
28 https://www.bleepingcomputer.com/news/security/powerschool-hacker-claims-they-stole-data-of-62-million-students/
Notes
Blurring
Boundaries 3
Vulnerability
Intelligence 4
Stolen Access
Credentials 6
Tips
7
Ransomware
5
Key
Findings 1
Threat
Snapshot 2