top of page
ALL POSTS
Malware Attacks: Russian APT Targets Ukraine with BadPaw and MeowMeow
Key Findings Researchers uncovered a Russian campaign targeting Ukrainian entities with new malware families BadPaw and MeowMeow delivered through phishing emails. The attack chain begins with a phishing email carrying a link to a ZIP archive. When opened, an HTA file displays a Ukrainian-language lure about border crossing appeals while secretly launching the infection chain. The malware uses the .NET Reactor packer to make analysis and reverse engineering harder, showing th
Mar 52 min read
Operation Leak: Dismantling the LeakBase Cybercrime Forum
Key Findings The Federal Bureau of Investigation (FBI) seized the LeakBase cybercrime forum (leakbase[.]la) as part of "Operation Leak", an international crackdown led by Europol. LeakBase was a key hub in the cybercrime ecosystem, specializing in trading leaked databases and "stealer logs" containing compromised credentials. The forum had over 142,000 registered users, approximately 32,000 posts, and more than 215,000 private messages as of December 2025. Law enforcement age
Mar 52 min read
Coruna iOS Exploit Kit Targeting iOS 13-17.2.1
Key Findings Google's Threat Intelligence Group (GTIG) identified a powerful new iOS exploit kit called Coruna (also known as CryptoWaters) The kit targets Apple iPhones running iOS versions 13.0 through 17.2.1 It includes five full exploit chains and a total of 23 exploits The kit is highly effective against the targeted iOS versions, but is ineffective against the latest iOS release Background GTIG first captured parts of an iOS exploit chain used by a customer of a surveil
Mar 52 min read
Silver Dragon: APT41-Linked Threat Targeting Governments with Cobalt Strike and Google Drive C2
Key Findings Silver Dragon, an APT group linked to APT41, has been targeting government entities in Europe and Southeast Asia since mid-2024. The group gains initial access by exploiting public-facing internet servers and delivering phishing emails with malicious attachments. Silver Dragon uses techniques like Cobalt Strike beacons and DNS tunneling for persistence and command-and-control (C2) communication. The group employs multiple infection chains, including AppDomain hij
Mar 42 min read
University of Hawaii Cancer Center Suffers Ransomware Attack, Exposing 1.2M Individuals
Key Findings A ransomware attack on the University of Hawaiʻi (UH) Cancer Center compromised personal data of approximately 1.2 million individuals. The attack, detected on August 31, 2025, targeted servers supporting the center's Epidemiology Division and did not impact clinical operations, patient care, or student records. The stolen data includes names, Social Security numbers, driver's license details, voter registration records, and health-related information, raising co
Mar 42 min read
CISA Adds Actively Exploited VMware Aria Operations Flaws to KEV Catalog
Key Findings The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog: CVE-2026-22719 (CVSS 8.1) - Broadcom VMware Aria Operations Command Injection Vulnerability CVE-2026-21385 (CVSS 7.8) - Qualcomm Multiple Chipsets Memory Corruption Vulnerability Background The Broadcom vulnerability is a command injection flaw that allows an unauthenticated attacker to execute arbitrary commands, po
Mar 41 min read
AI Agents: The Next Wave of Identity Dark Matter
Key Findings: The Model Context Protocol (MCP) is enabling AI agents to move beyond "chat" and into real enterprise work, providing structured access to applications, APIs, and data. These AI agents are rapidly being adopted in production, through horizontal assistants like Microsoft Copilot and vertical industry-specific agents. However, the governance and policy controls required to manage these AI agents are significantly lagging behind their adoption. These AI "colleagues
Mar 41 min read
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
Key Findings: Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor authentication (MFA) protections. Starkiller is advertised as a cybercrime platform by a threat group calling itself Jinkusu, granting customers access to a dashboard to impersonate brands or enter a brand's real URL. The platform lets users choose custom keywords and integrates URL shorteners to obscure the destin
Mar 33 min read
Hacker Deploys LLM-Powered AI To Attack FortiGate Devices Across 55 Countries
Key Findings: A Russian-speaking threat actor compromised over 600 FortiGate firewalls across 55 countries in just 5 weeks The attacker systematically used generative AI and large language models (LLMs) to write tools and plan follow-on actions inside victim networks The campaign did not rely on zero-day vulnerabilities, instead targeting publicly accessible admin panels and VPN portals protected by weak credentials Stolen FortiGate configurations provided detailed informatio
Mar 32 min read
Google Warns of Actively Exploited Qualcomm Zero-Day in Android
Key Findings Google disclosed that a high-severity vulnerability, CVE-2026-21385 (CVSS score: 7.8), affecting an open-source Qualcomm component used in Android devices has been actively exploited. The vulnerability is a buffer over-read in the Graphics component, described by Qualcomm as "memory corruption when adding user-supplied data without checking available buffer space" and an integer overflow. Google acknowledged "there are indications that CVE-2026-21385 may be under
Mar 32 min read
APT28 Exploited MSHTML 0-Day Before Microsoft Patch
Key Findings: Russia-linked APT28 reportedly exploited MSHTML zero-day CVE-2026-21513 (CVSS 8.8) before Microsoft patched it in February 2026 The vulnerability is an Internet Explorer security control bypass that can lead to code execution when a victim opens a malicious HTML page or LNK file Akamai researchers found a malicious sample uploaded to VirusTotal on January 2026 tied to infrastructure linked to APT28 The exploit relies on nested iframes and multiple DOM contexts t
Mar 21 min read
Fake Xeno and Roblox Utilities Used to Install Windows RAT, Microsoft Warns
Key Findings Cybersecurity researchers at Microsoft Threat Intelligence have found that attackers are circulating fake gaming tools that install a remote access trojan (RAT) when users run the files. The campaign relies on trojanized executables distributed through browsers and chat platforms, convincing victims to download software such as Xeno.exe or RobloxPlayerBeta.exe, which appear legitimate at first glance. The initial file acts as a downloader that prepares the system
Mar 12 min read
Sangoma FreePBX Vulnerability Exploited, Impacts Over 900 Instances
Key Findings About 900 Sangoma FreePBX systems were infected with web shells after attackers exploited a command injection flaw. Hundreds of Sangoma FreePBX instances are still infected with web shells following attacks that began in December 2025. The campaign exploited a post-authentication command injection vulnerability, tracked as CVE-2025-64328 (CVSS score of 8.6), in the endpoint manager interface. The Shadowserver Foundation reports that around 900 FreePBX instances a
Mar 12 min read
Cybercriminals Leverage AI 'Claude' to Breach Mexican Government Agencies
Key Findings Hackers abused Anthropic's Claude AI model to develop exploits, create custom tools, and automate the exfiltration of over 150GB of data in a cyberattack targeting Mexican government systems. The attackers compromised 10 Mexican government agencies and a financial institution, starting with the tax authority in December 2025. Hackers sent over 1,000 prompts to Claude and used OpenAI's GPT-4.1 to analyze stolen data. By bypassing AI guardrails and framing actions
Mar 12 min read
Flaw in ClawJacked Lets Malicious Sites Hijack Local OpenClaw AI Agents through WebSocket
Key Findings OpenClaw has fixed a high-severity security issue that could have allowed a malicious website to connect to a locally running AI agent and take over control. The flaw, dubbed "ClawJacked" by Oasis Security, enables a malicious website to silently open a WebSocket connection to the local OpenClaw gateway and brute-force the password. Upon successful authentication, the malicious script can register as a trusted device, which is automatically approved by the gatewa
Mar 12 min read
Gemini AI Data Exposure via Public Google API Keys
Key Findings Nearly 3,000 Google API keys (identified by the prefix "AIza") were found embedded in client-side code, providing access to sensitive Gemini endpoints and private data. The problem occurs when users enable the Gemini API on a Google Cloud project, causing the existing API keys in that project to gain access to Gemini endpoints without any warning or notice. Creating a new API key in Google Cloud defaults to "Unrestricted," meaning it's applicable for every enable
Feb 282 min read
ScarCruft's Audacious Breach: Zoho WorkDrive and USB Malware Compromise Air-Gapped Networks
Key Findings ScarCruft, a North Korean threat actor, has been attributed to a new set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications. The campaign, codenamed "Ruby Jumper" by Zscaler ThreatLabz, involves the deployment of various malware families to facilitate surveillance on victim systems. One of the malware components, THUMBSBD, uses removable media to relay commands and transfer data between internet-connected and air-g
Feb 282 min read
Aeternum C2: The Botnet That Lives on the Polygon Blockchain
Key Findings: Aeternum is a C++ botnet loader that uses the Polygon blockchain as its command-and-control (C2) infrastructure. The botnet stores its instructions in smart contracts on the Polygon blockchain, making its C2 effectively permanent and resistant to traditional takedown methods. Infected machines poll public RPC endpoints, read the on-chain instructions, and execute them, allowing the botnet operators to manage multiple contracts and payloads simultaneously. Blockc
Feb 272 min read
Google GTIG Disrupts China-Linked APT UNC2814, Halting Attacks on 53 Orgs in 42 Countries
Key Findings: Google Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign by UNC2814, a suspected China-linked cyber espionage group UNC2814 had breached at least 53 organizations across 42 countries, primarily targeting telecommunications and government sectors The group used a novel backdoor called GRIDTIDE that leveraged legitimate Google Sheets API functions for command-and-control GTIG took coordinated action to disrupt UNC2814's
Feb 272 min read
Aeternum C2 Botnet Leverages Polygon Blockchain to Evade Takedown
Key Findings Aeternum C2 is a new botnet that uses the Polygon blockchain to store encrypted command-and-control (C2) instructions. This approach makes Aeternum's C2 infrastructure effectively permanent and resistant to traditional takedown methods. The malware works by writing commands to be issued to infected hosts into smart contracts on the Polygon blockchain. The bots then read those commands by querying public remote procedure call (RPC) endpoints, with the commands man
Feb 262 min read
bottom of page
