Intelligence Feed
Real-time cybersecurity intelligence and threat analysis
TransUnion Data Breach Impacts 4.4 Million
The credit reporting firm did not name the third-party application involved in the incident, only noting that it was used for its US consumer suppo...

WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users
A sophisticated attack campaign has exploited a zero-day vulnerability in WhatsApp, affecting iOS and macOS users. The vulnerability, identified as...

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication
On August 29, 2025, Amazon announced that its threat intelligence team successfully disrupted a watering hole campaign orchestrated by APT29, a Rus...
WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users
A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific users, th...

Deception in depth: Defending against sophisticated and evolving PRC-nexus espionage campaigns
Presented by Patrick Whitsell, Security Engineer, Google Threat Intelligence Group and Austin Larsen, Principal Threat Analyst, Google Threat Intel...
Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign
Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the...

Sweden scrambles after ransomware attack puts sensitive worker data at risk
Municipal government organisations across Sweden have found themselves impacted after a ransomware attack at a third-party software service supplie...
Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions
On August 29, 2025, state officials in Nevada confirmed that a ransomware attack had disrupted critical services across the state, affecting agenci...
New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data
A newly identified cyber espionage campaign, dubbed TAOTH, has been exploiting an abandoned Chinese input method editor (IME), Sogou Zhuyin, to tar...

Weaponized PDFs and LNK Files Used in Windows Attacks
A recent cyber campaign has emerged, utilizing weaponized PDFs and malicious Windows shortcut (LNK) files to target individuals associated with aca...