THREAT INTELLIGENCE REPORTSubject: Coordinated Disinformation Surge Regarding Donald Trump’s Health StatusDate Range: August 27–30, 2025Report Date: August 30, 2025Prepared by: DisinfoTracker …| Krypt3ia
In today’s threat landscape, CTI as it’s commonly practiced—charting IOCs, naming malware strains, passing around the same handful of YARA rules—isn’t cutting it anymore. We’ve built an industry around collecting the digital exhaust of attackers while leaving the drivers untouched. We’ve become comfortable with symptoms and allergic to root cause. That’s a problem. Because the […]| Krypt3ia
IntroductionAs regional tensions flare following the Trump-era bombing of Iranian nuclear facilities, the cyber landscape has become a high-stakes theater of strategic confrontation. Iran’s Cyber-Electronic Command (CEC), under the Islamic Revolutionary Guard Corps (IRGC), commands a sprawling and compartmentalized network of cyber units with specialized missions ranging from offensive cyber operations to overseas sabotage, psychological […]| Krypt3ia
I’ve spent years in cybersecurity doing the kind of work that rarely makes it into a post: incident response at 3 a.m., tracking infrastructure across five hops, writing detections that actually fi…| Krypt3ia
Date: 2.21.25 🚨 Top Headlines Firing of 130 CISA staff worries cybersecurity industry Summary: The firing of upwards of 130 cybersecurity professionals at the US Cybersecurity and Infrastructure Se…| Krypt3ia
Date: 2.13.25 🚨 Top Headlines Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job Summary: Tools typically employed by Chinese cyberespionage groups have been used in a recent ransomware attack, likely by an individual hacker, Symantec notes in a fresh report. The toolset includes a legitimate Toshiba executable deployed on the victims’ systems to sideload […]| Krypt3ia
Date: 2.5.25 🚨 Top Headlines Five Eyes Launch Guidance to Improve Edge Device Security Summary: The UK’s leading cybersecurity agency and its Five Eyes peers have produced new guidance for manufacturers of edge devices designed to improve baseline security. GCHQ’s National Cyber Security Centre (NCSC) and allies in Australia, Canada, New Zealand and the US […]| Krypt3ia
Date: 2.4.25 🚨 Top Headlines Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks Summary: Texas Governor Greg Abbott has announced plans to create a Texas Cyber Command, designed to combat a “dramatic” rise in cyber-attacks targeting the US state. Abbott unveiled the Cyber Command as an emergency item during his State of the […]| Krypt3ia
Surveillance didn’t disappear after the Cold War—it evolved. Instead of trench coats and wiretaps, today’s watchers come in the form of data brokers, predictive algorithms, and AI-powered behavioral tracking. The new spies don’t need to tail you through the streets; they already know where you are, where you’ve been, and where you’re going next. And […]| Krypt3ia
Introduction: Surveillance isn’t what it used to be. The days of trench coats and dead drops have given way to a world where the watchers don’t need to be human, and the tails don’t need to have legs. The Cold War spooks who wrote the original Moscow Rules played a game of human tradecraft; today, […]| Krypt3ia
The New York Times reported on the emergence of several fake news sites with Russian ties, such as D.C. Weekly and the Miami Chronicle, aimed at disseminating Kremlin propaganda within the U.S. The…| Krypt3ia