She/they
🔹 Karthikeyan Nagaraj on how adversaries abuse SQLite databases to persist and exfiltrate data.
🔹 Aj on the hidden risks of malware lurking in smart home devices.
🔹 Karthikeyan Nagaraj on how adversaries abuse SQLite databases to persist and exfiltrate data.
🔹 Aj on the hidden risks of malware lurking in smart home devices.
This week I dropped the Threat Intelligence Digest and a deep dive into one of the most interesting campaigns we’ve tracked lately.
This week I dropped the Threat Intelligence Digest and a deep dive into one of the most interesting campaigns we’ve tracked lately.
I’ve been under the weather and had to pause this week’s review (Week 16). Thank you all for the continued support and engagement over the past weeks—it truly means a lot. Regular updates will hopefully resume next week.
I’ve been under the weather and had to pause this week’s review (Week 16). Thank you all for the continued support and engagement over the past weeks—it truly means a lot. Regular updates will hopefully resume next week.
Both are built for operational environments, not theory, and designed to integrate directly with your existing RFI/PIR workflows.
Both are built for operational environments, not theory, and designed to integrate directly with your existing RFI/PIR workflows.
• Silver Fox abusing Google Translate to deliver Winos RAT
• Storm-2603 evolving from ToolShell exploits to DNS-backdoored ransomware
• LockBit affiliates continuing their DLL sideloading campaigns
• Plague, a stealthy PAM-based Linux backdoor with zero VirusTotal hits
• Silver Fox abusing Google Translate to deliver Winos RAT
• Storm-2603 evolving from ToolShell exploits to DNS-backdoored ransomware
• LockBit affiliates continuing their DLL sideloading campaigns
• Plague, a stealthy PAM-based Linux backdoor with zero VirusTotal hits
Our latest roundup covers three high-impact threats, all grounded in real-world exploitation, not theory:
🔹 SharePoint Zero-Day (CVE-2025-53770)
Our latest roundup covers three high-impact threats, all grounded in real-world exploitation, not theory:
🔹 SharePoint Zero-Day (CVE-2025-53770)
Heads up to my contacts in the government space:
If your purple and blue teams haven’t been briefed on CVE-2025-53770 yet, now’s the time. This critical SharePoint zero-day is being actively exploited in the wild, and patching alone won’t cut it.
Heads up to my contacts in the government space:
If your purple and blue teams haven’t been briefed on CVE-2025-53770 yet, now’s the time. This critical SharePoint zero-day is being actively exploited in the wild, and patching alone won’t cut it.
This week’s drop is live and we’re focusing on the heart of the Threat Intelligence Lifecycle: Processing and Analysis.
This is the stage where raw indicators become insight. Where screenshots, IOCs, and loose observations start forming a story.
This week’s drop is live and we’re focusing on the heart of the Threat Intelligence Lifecycle: Processing and Analysis.
This is the stage where raw indicators become insight. Where screenshots, IOCs, and loose observations start forming a story.
🔗 All links here: linktr.ee/itsmalware
I started writing these digests after getting laid off in April. The job market has been brutal and with a family to support, I’m doing everything I can to stay afloat, stay sharp, and keep contributing to the community.
🔗 All links here: linktr.ee/itsmalware
I started writing these digests after getting laid off in April. The job market has been brutal and with a family to support, I’m doing everything I can to stay afloat, stay sharp, and keep contributing to the community.
IndigoINT is bringing internal analysis to the table this week. Thanks to Hunt.io we’ve been tracking malware distributed via Iranian hosting, blending:
IndigoINT is bringing internal analysis to the table this week. Thanks to Hunt.io we’ve been tracking malware distributed via Iranian hosting, blending:
This week’s edition covers both escalation and erosion across the global threat landscape:
#ThreatIntelligence #CyberSecurity #APT #Ransomware #CTI #Malware #InfoSec #CyberThreats #IndigoINT
This week’s edition covers both escalation and erosion across the global threat landscape:
#ThreatIntelligence #CyberSecurity #APT #Ransomware #CTI #Malware #InfoSec #CyberThreats #IndigoINT
Please don't hire intelligence analysts and have them start guessing what they should be doing.
Please don't hire intelligence analysts and have them start guessing what they should be doing.
Then again maybe that's all life is?
Then again maybe that's all life is?