An OSINT-led assessment of the October 2025 deadline release by Scattered Shiny Hunters By Krypt3ia Executive Summary In September 2025, a coalition of cybercriminals operating under the banner Scattered LAPSUS$ Hunters (SLSH) emerged with a new dark web leak portal that marked a notable escalation in scale and ambition. This group , a convergence of […]| Krypt3ia
A Clear and Present RiskArtificial General Intelligence and Artificial Superintelligence are not simply technologies. They are thresholds beyond which humanity may lose control over its creations. Every complex system fails eventually. Computer science shows that full control cannot be proven. Once unleashed, a superintelligent agent could act in ways that are unpredictable, irreversible, and global. […]| Krypt3ia
This document defines SENTRY, a new, integrated framework that unifies and extends existing threat taxonomies, adversarial-ML taxonomies, red-team failure modes, sector playbooks, and defense-in-de…| Krypt3ia
THREAT INTELLIGENCE REPORTSubject: Coordinated Disinformation Surge Regarding Donald Trump’s Health StatusDate Range: August 27–30, 2025Report Date: August 30, 2025Prepared by: DisinfoTracker …| Krypt3ia
In today’s threat landscape, CTI as it’s commonly practiced—charting IOCs, naming malware strains, passing around the same handful of YARA rules—isn’t cutting it anymore. We’ve built an industry around collecting the digital exhaust of attackers while leaving the drivers untouched. We’ve become comfortable with symptoms and allergic to root cause. That’s a problem. Because the […]| Krypt3ia
IntroductionAs regional tensions flare following the Trump-era bombing of Iranian nuclear facilities, the cyber landscape has become a high-stakes theater of strategic confrontation. Iran’s Cyber-Electronic Command (CEC), under the Islamic Revolutionary Guard Corps (IRGC), commands a sprawling and compartmentalized network of cyber units with specialized missions ranging from offensive cyber operations to overseas sabotage, psychological […]| Krypt3ia
I’ve spent years in cybersecurity doing the kind of work that rarely makes it into a post: incident response at 3 a.m., tracking infrastructure across five hops, writing detections that actually fi…| Krypt3ia
Date: 2.21.25 🚨 Top Headlines Firing of 130 CISA staff worries cybersecurity industry Summary: The firing of upwards of 130 cybersecurity professionals at the US Cybersecurity and Infrastructure Se…| Krypt3ia
Date: 2.13.25 🚨 Top Headlines Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job Summary: Tools typically employed by Chinese cyberespionage groups have been used in a recent ransomware attack, likely by an individual hacker, Symantec notes in a fresh report. The toolset includes a legitimate Toshiba executable deployed on the victims’ systems to sideload […]| Krypt3ia
Date: 2.5.25 🚨 Top Headlines Five Eyes Launch Guidance to Improve Edge Device Security Summary: The UK’s leading cybersecurity agency and its Five Eyes peers have produced new guidance for manufacturers of edge devices designed to improve baseline security. GCHQ’s National Cyber Security Centre (NCSC) and allies in Australia, Canada, New Zealand and the US […]| Krypt3ia