-
🔴 New security advisory:
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized infosec zeroday threatintel0 Votes1 Posts1 Views -
(catonetworks.com) Global Modbus/TCP Campaign Targets Internet-Exposed PLCs Across 70 Countries with China-Geolocated Infrastructure Observed
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(gdatasoftware.com) Foxit PDF Brand Impersonation Campaign Delivers Concealed UltraVNC Remote Access Tool
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(zscaler.com) Tropic Trooper Deploys AdaptixC2 Beacon with Custom GitHub C2 Listener via Trojanized SumatraPDF
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(sysdig.com) LMDeploy SSRF Vulnerability CVE-2026-33626 Exploited Within Hours of Disclosure Against AI Inference Infrastructure
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
🛡 THREAT INTEL | STERIMED
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized darkweb databreach threatintel cybersecurity infosec0 Votes1 Posts1 Views -
🚨 New security advisory:
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized infosec zeroday threatintel0 Votes1 Posts3 Views -
🇺🇸 INC Ransom claims ransomware attack on United States' Precision Coating Company.
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized ransomware healthcare usa threatintel
1
0 Votes1 Posts4 Views -
The best time to block api
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized threatintel threatintellige ifin0 Votes3 Posts0 Views -
(cofense.com) Polymorphic Phishing: How Shape-Shifting Email Attacks Are Defeating Traditional Defenses
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(jamf.com) DarkSword Leaked: Inside a Government-Grade iOS Safari Exploit Kit and Its Implications for the Mobile Threat Landscape
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
🚨 Lotus Wiper detectedEnergy sector hitNo ransom, full wipeLOLBins + legacy targeting💬 Defense strategy?
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized infosec threatintel
1
0 Votes1 Posts0 Views -
(cofense.com) Legitimate Tools as Weapons: How Threat Actors Abuse RATs and CVEs to Evade Detection
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(sublime
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(malwarebytes.com) Needle Stealer: Golang-Based Modular Infostealer Distributed via Fake AI Trading Tool Website
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
🔴 CISA KEV: 8 flaws now actively exploited, including Quest KACE SMA CVSS 10.0 and Cisco SD-WAN.
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity infosec threatintel vulnmgmt0 Votes1 Posts0 Views -
(hunt.io) Malware Delivery via Open Directories: AsyncRAT and Cobalt Strike Campaign Analysis
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(security.com) Harvester APT Group Deploys New GoGra Linux Backdoor Targeting South Asia Using Microsoft Graph API for C2
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
(paloaltonetworks.com) AirSnitch: Novel Wi-Fi Attack Techniques Break WPA2/WPA3-Enterprise Client Isolation
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized cybersecurity threatintel0 Votes1 Posts0 Views -
Nice, after half a century we got a new Five-Eyes-Alliance Querty-Keylogger Sample
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized thruntersanonym threatintel0 Votes1 Posts4 Views