Analyst Brief

What this page is, who it is for, and how the data is curated

This public threat-intelligence page is built for security leaders, operators, and decision-makers who need a curated view of meaningful cyber activity rather than a raw feed of every reported incident. The dataset favors verified reporting, source corroboration, and strategic relevance over volume.

16 curated incidentsPublished with sector, region, severity, and confidence signals.
16 high-confidence assessmentsCurated from verified open-source intelligence with explicit source links.
Updated March 17, 2026Locations represent affected regions, not implied attacker origin.

Featured incident summaries with sources

April 14, 2025RetailEuropehigh confidence

Marks & Spencer Ransomware Attack

Six-week operational disruption causing an estimated £300 million in losses.

A watershed moment for the retail sector, illustrating how social engineering of third-party help desks can collapse core corporate infrastructure.

Sources: www.int-comp.org

April 17, 2025TelecommunicationsAPAChigh confidence

SK Telecom BPFDoor Intrusion

APT infiltration of Linux servers exposed SIM data of 27 million subscribers.

A highly stealthy, state-sponsored operation that resulted in severe regulatory fines and the mass defection of hundreds of thousands of customers.

Sources: www.alstonprivacy.com

February 20, 2025FinanceMiddle East / Africahigh confidence

Bybit Cryptocurrency Heist

Malicious script in third-party storage enabled the theft of $1.5 billion in Ethereum.

The largest crypto heist in history, executed via a subtle supply chain manipulation to bypass international sanctions.

Sources: www.int-comp.org

Intelligence Overview

Global Threat Landscape

2025 Dataset
Ransomware Supply Chain Credential Theft Exploitation Other Campaigns
2025 TimelineJanuary – December 2025Showing 16 of 16 incidents

Locations represent affected regions, not confirmed attacker origins. Intelligence confidence is assessed per incident.

Threat Intelligence — 2025

2025 Threat Intelligence, Mapped for Decision‑Makers

Explore the most significant attack patterns of 2025 through a curated intelligence lens. See what matters, where risk is concentrating, and what to watch next.

Curated from verified open-source intelligence. Selected for relevance, not volume.

16Curated Incidents
6Regions Affected
12Sectors Targeted
RANSOMWARE

Marks & Spencer Ransomware Attack

high
April 14, 2025RetailEuropeSeverity: 8/10Scattered Spider

Summary

Six-week operational disruption causing an estimated £300 million in losses.

Why It Matters

A watershed moment for the retail sector, illustrating how social engineering of third-party help desks can collapse core corporate infrastructure.

Deep AnalysisComing Soon

Exclusive financial impact modeling available in the premium report.

8.8 / 10Avg. Severity
16 / 16High Confidence
5Featured Incidents
Attack Pattern

ransomware

6 incidents documented across the 2025 dataset. Deeper pattern analysis available in the full brief.

Attack Pattern

vulnerability exploitation

4 incidents documented across the 2025 dataset. Deeper pattern analysis available in the full brief.

Attack Pattern

credential theft / phishing

2 incidents documented across the 2025 dataset. Deeper pattern analysis available in the full brief.

Attack Pattern

other high-impact campaigns

2 incidents documented across the 2025 dataset. Deeper pattern analysis available in the full brief.

Attack Pattern

supply chain / third-party

2 incidents documented across the 2025 dataset. Deeper pattern analysis available in the full brief.

Coming Soon

The full 2025 Threat Brief is on its way.

Deep-dive analysis, TTP mappings, and executive briefings. Subscribe below to be notified when it launches.

Selected Intelligence from 2025

Each incident below represents a curated intelligence assessment. Select any card to view the summary. Deeper analysis is reserved for the full report.

Stay Informed

Stay Ahead of Emerging Threats

Get curated threat intelligence updates delivered to your inbox. No spam, no noise — just actionable insights on the threats that matter.

No spam, ever. Unsubscribe anytime. We respect your privacy.

Our Approach

Intelligence Built on Judgment, Not Volume

This is not a feed of every reported incident. Every entry in this dataset has been selected, validated, and assessed for relevance to decision-makers. We prioritize quality of signal over quantity of noise.

Locations on the globe represent affected regions and impact geography — not implied attacker attribution. Confidence ratings reflect our assessment of source reliability and corroboration.

Source Curation

Incidents drawn from verified reporting, security research, regulatory filings, and trusted industry sources.

Relevance Filtering

Selected for strategic significance, sector impact, and pattern recognition — not recency or volume.

Confidence Rating

Each incident carries an assessed confidence level based on source corroboration and evidence quality.

Operator Perspective

Analysis framed for defenders and executives, not headline-driven coverage. Context over clickbait.

Awareness Is the First Line of Defense.

Subscribe for curated threat intelligence updates, or learn how to report cyber crime to the right authorities.