Skip to main content
Ericsson Enterprise Wireless Solutions
1-855-813-3385Sign in
Sign in
Ericsson Enterprise Wireless Solutions

Products

  • Routers
  • Adapters
  • Radios
  • Ericsson Private 5G
  • Enterprise 5G Coverage
  • NetCloud SASE

Company

  • Contact Us
  • Trust & Security
  • Careers
  • Blog
  • About WWAN
  • Privacy
  • Manage My Preferences
  • Do Not Sell or Share My Personal Information

Browse Endpoints

  • Fixed Site Routers
  • Cellular Adapters
  • Vehicle Routers
  • IoT Routers
  • Cellular Access Points
  • Accessories
  • Compare Endpoints
footer-map-blue.png

NORTH AMERICA HQ

1100 W. Idaho Street
Suite 800
Boise , ID 83702-5389
United States
© Copyright 2005-2025 Ericsson Enterprise Wireless Solutions, Inc. All rights reserved.
Privacy Policy|Legal|Do Not Sell or Share My Personal Information
Enterprise Wireless Blog>Q3 Threat Intelligence Report: Trending Malware, Breaches, and Vulnerabilities
cross-industry

Q3 Threat Intelligence Report: Trending Malware, Breaches, and Vulnerabilities

JUL 26, 2024 | 2 min read
Ericsson Enterprise Wireless Solutions

Ericsson Enterprise Wireless Solutions

Share this post

Q3 Threat Intelligence Report: Trending Malware, Breaches, and Vulnerabilities

Each quarter, the Cradlepoint Threat Research and Analysis (TR&A) Team publishes a threat intelligence report to inform customers about relevant changes in the threat landscape. This report covers events from April through June 2024.

Our Views on Recent Attacks

In the past quarter, warnings and reports of attacks on critical infrastructure published by government organizations such as the Cyber and Infrastructure Security Agency (CISA) topped cybersecurity headlines, followed closely by company data breach reports. CISA issued #StopRansomware reports for Black Basta and Akira ransomware, stating that affiliates gained initial access by exploiting application vulnerabilities. Application vulnerabilities were the most exploited category at 39% per the CISA Known Exploited Vulnerabilities (KEV) list, likely indicating an increased threat to unpatched, internet-facing applications. Info-stealer and loader malware were leading initial access techniques in data breach and ransomware attacks, with SocGholish and Atomic Stealer reported as the most active. CISA also published warnings of increased activity from APT40 using living-off-the-land techniques, and that proRussian hacktivists are likely to increase the impact of their attacks by using more sophisticated tooling.

Over 55 million people were impacted by non-Snowflake-related data breaches, losing sensitive information such as medical records, payment details, and passwords. Reports of data loss from attacks on customers using the Snowflake data cloud continued as organizations who failed to implement MFA on their accounts gradually disclosed the sensitive data they lost. However, only 11 of the estimated 165 impacted companies have confirmed a data breach as of June 2024. Additional reporting is expected as companies reach regulation time requirements for reporting a data breach.

RELATED CONTENT

Salesloft Drift data breach: Key details for Ericsson Enterprise Wireless Solutions customers

SEP 5, 2025 | cross-industry

Salesloft Drift data breach: Key details for Ericsson Enterprise Wireless Solutions customers

Ericsson Enterprise Wireless Solutions

Why neutral host networks are turning to 5G small cells instead of legacy DAS

SEP 2, 2025 | cross-industry

Why neutral host networks are turning to 5G small cells instead of legacy DAS

Ericsson Enterprise Wireless Solutions

Artificial Intelligence Drives Wireless WAN Needs

AUG 15, 2025 | cross-industry

Artificial Intelligence Drives Wireless WAN Needs

Ericsson Enterprise Wireless Solutions