Skip to content
  • Wed. Apr 1st, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Nation_State_Actors

Latest Post

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

EDITOR'S CHOICE

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
Articles

BadPaw and MeowMeow: steganographic .NET malware hits Ukrainian targets

12 March 2026 Threat Analyst
Articles

UAT-9244 hits South American telcos with TernDoor, PeerTime and BruteEntry

6 March 2026 Threat Analyst
Articles

BadAudio and APT24: “good enough” OPSEC powering a multi-vector espionage chain

2 March 2026 Threat Analyst
Articles

Iran crisis cyber risk rises as defacements and disruptive activity reported

2 March 2026 Threat Analyst
Articles

OpenClaw “ClawJacked” chain: malicious websites can hijack local AI agents via localhost WebSockets

2 March 2026 Threat Analyst
Incident_Reports

Asahi Cyberattack and Data Breach: Ransomware-Driven Disruption and Nearly Two Million Records at Risk

20 December 2025 Threat Analyst

1. Executive Summary In late September 2025, Asahi Group Holdings disclosed a cyberattack that disrupted core business systems in Japan and later confirmed that personal information linked to nearly two…

Vulnerabilities_Exploits

Cisco Critical Zero-Day Vulnerabilities (Sept 2025): SNMP Exploitation and Perimeter Firewall Zero-Days

20 December 2025 Threat Analyst

1. Executive Summary In late September 2025, Cisco disclosed multiple high-risk vulnerabilities affecting core networking and perimeter security products, with confirmed in-the-wild exploitation reported for several issues. Of particular concern,…

Uncategorised

Microsoft Patch Tuesday — November 2025

14 November 2025 Threat Analyst

Microsoft’s November 2025 security updates address 63 CVEs across Windows and multiple Microsoft products. (Tenable®)Public reporting varies on the exact number of “Critical” issues (some analyses cite 4 or 5…

Vulnerabilities_Exploits

Fortinet FortiWeb Under Active Exploitation: CVE-2025-64446 and CVE-2025-58034

2 November 2025 Threat Analyst

1. Executive Summary Two Fortinet FortiWeb vulnerabilities — CVE-2025-64446 (relative path traversal enabling unauthenticated administrative command execution) and CVE-2025-58034 (OS command injection enabling authenticated code execution) — were disclosed in…

Incident_Reports

Nominet Confirms Network Intrusion Linked to Ivanti Connect Secure Zero-Day (CVE-2025-0282)

20 October 2025 Threat Analyst

CVE-2025-0283 was disclosed alongside CVE-2025-0282 and described by NVD as a stack-based buffer overflow leading to local privilege escalation. CISA added CVE-2025-0282 to its Known Exploited Vulnerabilities (KEV) catalogue on…

Articles

Scattered Spider Attacks on Airlines (Qantas, WestJet, Hawaiian Airlines)

20 October 2025 Threat Analyst

1. Executive Summary In late June to early July 2025, multiple airlines disclosed cybersecurity incidents affecting internal systems and/or customer data, with reporting and government/industry warnings pointing to activity consistent…

Articles

U.S. Telecom “Lawful Intercept” Systems Targeted in China-Linked Intrusions (Salt Typhoon)

20 September 2025 Threat Analyst

1. Executive Summary Public reporting indicates China-linked threat actors compromised multiple U.S. broadband/telecommunications providers, including AT&T, Verizon, and Lumen, with access potentially extending to systems and processes supporting court-authorised wiretapping…

Articles

Chinese Surveillance-Grade Data Exposure (631GB / ~4B records) — Threat Intelligence Brief

20 August 2025 Threat Analyst

1. Executive Summary In May 2025, security researcher Bob Dyachenko (SecurityDiscovery.com) and the Cybernews research team identified a publicly exposed database (~631GB) containing roughly 4 billion records, predominantly related to…

Threat_Actor_Profiles

Akira Ransomware Targeting SonicWall Gen 7 SSLVPN: CVE-2024-40766, Credential Reuse, and Post-Migration Exposure

20 August 2025 Threat Analyst

1. Executive Summary A cluster of ransomware intrusions attributed to Akira affiliates surged in late July 2025, with defenders reporting initial access via SonicWall Gen 7 (and newer) firewalls where…

Vulnerabilities_Exploits

Microsoft SharePoint Zero-Day Exploitation — CVE-2025-53770 (“ToolShell”)

20 August 2025 Threat Analyst

1. Executive Summary CVE-2025-53770 is a critical deserialisation-of-untrusted-data vulnerability in on-premises Microsoft SharePoint Server that enables unauthenticated remote code execution (RCE) over the network. Microsoft confirmed the issue was exploited…

Posts pagination

1 … 6 7 8 … 29
Search
Recent Posts
  • OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
  • Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
  • Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
  • Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
  • Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Archives
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
TIR

TIR

© Copyright 2026 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe