What this page is, who it is for, and how the data is curated
This public threat-intelligence page is built for security leaders, operators, and decision-makers who need a curated view of meaningful cyber activity rather than a raw feed of every reported incident. The dataset favors verified reporting, source corroboration, and strategic relevance over volume.
16 curated incidentsPublished with sector, region, severity, and confidence signals.
16 high-confidence assessmentsCurated from verified open-source intelligence with explicit source links.
Updated March 17, 2026Locations represent affected regions, not implied attacker origin.
Featured incident summaries with sources
April 14, 2025 • Retail • Europe • high confidence
Marks & Spencer Ransomware Attack
Six-week operational disruption causing an estimated £300 million in losses.
A watershed moment for the retail sector, illustrating how social engineering of third-party help desks can collapse core corporate infrastructure.
Ransomware Supply Chain Credential Theft Exploitation Other Campaigns
2025 TimelineJanuary – December 2025Showing 16 of 16 incidents
JanFebMarAprMayJunJulAugSepOctNovDecAll
Locations represent affected regions, not confirmed attacker origins. Intelligence confidence is assessed per incident.
Threat Intelligence — 2025
2025 Threat Intelligence, Mapped for Decision‑Makers
Explore the most significant attack patterns of 2025 through a curated intelligence lens. See what matters, where risk is concentrating, and what to watch next.
Each incident below represents a curated intelligence assessment. Select any card to view the summary. Deeper analysis is reserved for the full report.
Stay Informed
Stay Ahead of Emerging Threats
Get curated threat intelligence updates delivered to your inbox. No spam, no noise — just actionable insights on the threats that matter.
No spam, ever. Unsubscribe anytime. We respect your privacy.
Our Approach
Intelligence Built on Judgment, Not Volume
This is not a feed of every reported incident. Every entry in this dataset has been selected, validated, and assessed for relevance to decision-makers. We prioritize quality of signal over quantity of noise.
Locations on the globe represent affected regions and impact geography — not implied attacker attribution. Confidence ratings reflect our assessment of source reliability and corroboration.
Source Curation
Incidents drawn from verified reporting, security research, regulatory filings, and trusted industry sources.
Relevance Filtering
Selected for strategic significance, sector impact, and pattern recognition — not recency or volume.
Confidence Rating
Each incident carries an assessed confidence level based on source corroboration and evidence quality.
Operator Perspective
Analysis framed for defenders and executives, not headline-driven coverage. Context over clickbait.
Awareness Is the First Line of Defense.
Subscribe for curated threat intelligence updates, or learn how to report cyber crime to the right authorities.