IntelNexus
FeedMapBoardBountiesBrief
Sign InDrop IntelDrop
Home/Intel/Chain

Intel Chain

Root Intel
01KQ8HA4D64S…
Phony whistleblowers, fake journalists and cyber spies: ICIJ network targeted after China Targets probe

Shortly after publication, a slew of fake ICIJ reporters approached journalists, Taiwanese officials, and human rights advocates seeking sensitive data. With Citizen Lab, we investigated Source: ICIJ

View full intel →
1
Corroborations
0
Contradictions
0
Expansions
0
References
Overall Credibility Score1%

Evidence Chain (1 linked intel)

Corroborates01KQ6CYT…
CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is below - CVE-2024-57726 (CVSS score: 9.9) - A missing authorization vulnerability in Source: The Hacker News

CYBER
View
Corroborates01KQ59S0…
Zelenskyy ready to hold Ukraine-Russia talks in Azerbaijan

Ukrainian President Volodymyr Zelenskyy said his country is ready to hold talks with Russia in Azerbaijan. Meanwhile, Russian attacks killed several people across Ukraine. Source: World | Deutsche Welle

TERRORISM
View

Have related intel?

Corroborate, contradict, or expand this intelligence chain.

CorroboratesContradictsExpands
Corroborates01KQ4EMR…
How Iran is wielding the Strait of Hormuz as leverage

While the US is signaling a desire to negotiate, Iranians are playing for time — counting on the world's dependence on Persian Gulf energy exports and their strongest weapon, the Strait of Hormuz. Source: World | Deutsche Welle

MILITARY
View