Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 16, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: BruteForce Attack Against Apache TomCat Manager GreyNoise recently observed a coordinated spike in malicious activity against Apache Tomcat Manager interfaces. On June 5, 2025, GreyNoise registered well above baseline volumes, indicating a deliberate attempt to identify and access exposed Tomcat services at scale.

ThreatQuotient to join Securonix

Today is a big day for the Crash. We are announcing the next step in our collective journey – Securonix has acquired ThreatQuotient. This is an exciting and rare opportunity to combine Securonix’s best-in-class security analytics and detection with ThreatQ’s best-in-class threat intelligence platform. As we all know, the security operations world is changing at a dramatic pace.

How to Keep Major Worldwide Sporting Events on Secure Ground Using Threat Intelligence Reporting

As we look at the sporting calendar for 2025 with the UEFA Women’s European Championship in Switzerland and the Tour de France in July, as well as the 2025 Women's Rugby World Cup in the UK starting in August, armchair sportspeople and in-person spectators are spoilt for choice. But aside from the marvel of watching athletes compete to achieve their dreams, the organization (and security) of such events requires meticulous planning, particularly as dates are fixed and immovable.

June 9, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Proof of Concept Exploit Released for CVE-2025-32756 Further to Kroll reporting in May regarding a critical zero-day vulnerability, CVE-2025-32756 in Fortinet, is now being actively exploited in the wild, with attackers using a crafted AuthHash cookie to gain control of affected systems.

Security Bulletin: Revolver Rabbit and the Rise of RDGAs

Their domains typically follow repeatable patterns, such as dictionary words plus numeric suffixes (e.g., private-jets-99557bond). Additional variants use short alphanumeric suffixes or double dashes, complicating rule-based detection (Infoblox Blog, 2024). These syntactic variations often evade traditional string-matching techniques, requiring DNS-layer telemetry and clustering for full visibility (Infoblox Research Report, 2024).

ThreatBook Selected in the First-ever Gartner® Magic Quadrant for Network Detection and Response (NDR)

After nearly a year of research and evaluation, Gartner released the first "Magic Quadrant for Network Detection and Response" report on May 29, ThreatBook became the only Chinese company selected.

New Ransomware Groups Emerging in Late May 2025: A Threat Intelligence Overview

As of the end of May 2025, seven new ransomware groups have surfaced with active leak sites and confirmed victim postings. These groups—Silent Ransomware, Gunra Ransomware, JGroup Ransomware, IMN Crew, DireWolf Ransomware, DataCarry Ransomware, and SatanLock Ransomware have demonstrated early signs of active targeting and data exfiltration campaigns. This blog provides a detailed breakdown of their activity, initial victimology, and attribution by geography where applicable.

Beyond Compliance: How Cyber Threat Intelligence Fortifies Third-Party Risk Management

Third-Party Risk Management (TPRM) is a critical function for modern organizations, given the reliance on external vendors and partners. The interconnectedness of digital ecosystems means that a breach at a third party can have severe repercussions for your organization. In a recent Dark Reading survey, 30% of organizations experienced some or many supply chain attacks over the past 12 months, and only 14% of respondents reported themselves confident their supply chain is completely secure.

Webinar Takeaways: Automate the Threat Intelligence Lifecycle to Strengthen Defenses

Threat analysts are being bombarded with hundreds, if not thousands, of threat intel data points including new indicators of compromise (IoCs), evolving threat actor groups, shifts in regions and industries being targeted and new tools, techniques and procedures (TTPs). Security operations must be data driven so you can understand threats and efficiently allocate resources to address your most important requirements.