Back to Blog

#Threat Intelligence

5 posts

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

Executive Summary Since February 2026, the North Korea–linked group UNC1069 has been observed running a highly targeted deepfake campaign against cryptocurrency...

February 14, 2026
3 min read

CVE-2026-21643 & CVE-2026-24858: Fortinet Critical Flaws | 2026

Executive Summary Since December 2025, two critical vulnerabilities in Fortinet's infrastructure have created a perfect storm for enterprise compromise: [CVE-20...

February 10, 2026
9 min read

MaliciousCorgi: VSCode Supply Chain Attack on 1.5M Devs | 2026

Executive Summary Since January 2026, the sophisticated MaliciousCorgi supply chain attack has weaponized two malicious AI coding assistants on the official VSC...

February 2, 2026
6 min read

Mandiant Findings ShinyHunters Voice Phishing: SaaS Extortion Research

Executive Summary Since June 2025, [ShinyHunters](https://cloud.google.com/blog/topics/threat-intelligence/expansion-shinyhunters-saas-data-theft) cybercrime co...

January 31, 2026
11 min read

CVE-2025-8088: The WinRAR Path Traversal Flaw Powering Global Cyberattacks—From Russian Spies to Ransomware Gangs

Executive Summary Since July 2025, the critical CVE-2025-8088 vulnerability in WinRAR has become a weaponized vector for initial access, exploited by state-spon...

January 29, 2026
3 min read