Massive spam campaign floods npm to abuse the TEA Protocol crypto scheme; it is not a worm and poses no direct security threat.
-
IOCs: tea. xyz
-
#Spam #ThreatIntel #npm
Massive spam campaign floods npm to abuse the TEA Protocol crypto scheme; it is not a worm and poses no direct security threat.
-
IOCs: tea. xyz
-
#Spam #ThreatIntel #npm
Malicious npm packages use Adspect cloaking to fingerprint users and redirect victims to malicious sites while evading researchers.
-
IOCs: association-google. xyz, appprotector. online, protectorapp. online
-
#Malware #ThreatIntel #npm
Malicious npm packages use Adspect cloaking to fingerprint users and redirect victims to malicious sites while evading researchers.
-
IOCs: association-google. xyz, appprotector. online, protectorapp. online
-
#Malware #ThreatIntel #npm
New LLM-enabled malware generates code at runtime but can be detected by hunting for hardcoded API keys and prompts.
-
IOCs: PromptLock, PROMPTSTEAL, MalTerminal
-
#AI #Malware #ThreatIntel
New LLM-enabled malware generates code at runtime but can be detected by hunting for hardcoded API keys and prompts.
-
IOCs: PromptLock, PROMPTSTEAL, MalTerminal
-
#AI #Malware #ThreatIntel
Iran-nexus actor UNC1549 targets aerospace & defense via third-party compromise, phishing, and custom malware for espionage.
-
IOCs: 104. 194. 215. 88, 13. 60. 50. 172, 167. 172. 137. 208
-
#Espionage #ThreatIntel #UNC1549
Iran-nexus actor UNC1549 targets aerospace & defense via third-party compromise, phishing, and custom malware for espionage.
-
IOCs: 104. 194. 215. 88, 13. 60. 50. 172, 167. 172. 137. 208
-
#Espionage #ThreatIntel #UNC1549
PyPI has expanded its tokenless Trusted Publishing feature to support GitLab Self-Managed instances, enhancing software supply chain security.
-
IOCs: (None identified)
-
#GitLab #PyPI #SupplyChainSecurity #ThreatIntel
PyPI has expanded its tokenless Trusted Publishing feature to support GitLab Self-Managed instances, enhancing software supply chain security.
-
IOCs: (None identified)
-
#GitLab #PyPI #SupplyChainSecurity #ThreatIntel
Large-scale campaigns impersonate popular software to deliver Gh0st RAT to Chinese-speaking users using increasingly evasive TTPs.
-
IOCs: 156. 251. 25. 112, 103. 181. 134. 138, 95. 173. 197. 195
-
#Gh0stRAT #Malware #ThreatIntel
Large-scale campaigns impersonate popular software to deliver Gh0st RAT to Chinese-speaking users using increasingly evasive TTPs.
-
IOCs: 156. 251. 25. 112, 103. 181. 134. 138, 95. 173. 197. 195
-
#Gh0stRAT #Malware #ThreatIntel
Unauthenticated path traversal vulnerability CVE-2025-64446 in FortiWeb is actively exploited, allowing remote administrative command execution.
-
IOCs: CVE-2025-64446
-
#CVE202564446 #Fortinet #ThreatIntel
Unauthenticated path traversal vulnerability CVE-2025-64446 in FortiWeb is actively exploited, allowing remote administrative command execution.
-
IOCs: CVE-2025-64446
-
#CVE202564446 #Fortinet #ThreatIntel
Threat actors are leveraging agentic AI to automate and scale sophisticated attacks, requiring enterprises to adopt AI-driven defenses.
-
IOCs: (None identified)
-
#AI #Cybercrime #ThreatIntel
Threat actors are leveraging agentic AI to automate and scale sophisticated attacks, requiring enterprises to adopt AI-driven defenses.
-
IOCs: (None identified)
-
#AI #Cybercrime #ThreatIntel
CISA warns of active exploitation of a Fortinet FortiWeb path traversal vulnerability (CVE-2025-64446) by adding it to the KEV catalog.
-
IOCs: CVE-2025-64446
-
#CVE202564446 #Fortinet #ThreatIntel
CISA warns of active exploitation of a Fortinet FortiWeb path traversal vulnerability (CVE-2025-64446) by adding it to the KEV catalog.
-
IOCs: CVE-2025-64446
-
#CVE202564446 #Fortinet #ThreatIntel
The 'Safery: Ethereum Wallet' Chrome extension exfiltrates crypto seed phrases via Sui blockchain transactions.
-
IOCs: kifagusertyna@gmail[. ]com, fibemlnkopkeenmmgcfohhcdbkhgbolo
-
#Crypto #Malware #ThreatIntel
The 'Safery: Ethereum Wallet' Chrome extension exfiltrates crypto seed phrases via Sui blockchain transactions.
-
IOCs: kifagusertyna@gmail[. ]com, fibemlnkopkeenmmgcfohhcdbkhgbolo
-
#Crypto #Malware #ThreatIntel
DragonBreath APT uses new multi-stage loader RONINGLOADER to disable security tools via PPL abuse and deploy a gh0st RAT variant.
-
IOCs: qaqkongtiao. com
-
#DragonBreath #RoningLoader #ThreatIntel
DragonBreath APT uses new multi-stage loader RONINGLOADER to disable security tools via PPL abuse and deploy a gh0st RAT variant.
-
IOCs: qaqkongtiao. com
-
#DragonBreath #RoningLoader #ThreatIntel
CISA released 18 new advisories detailing security issues and vulnerabilities in various Industrial Control Systems.
-
IOCs: (None identified)
-
#ICS #ThreatIntel #Vulnerability
CISA released 18 new advisories detailing security issues and vulnerabilities in various Industrial Control Systems.
-
IOCs: (None identified)
-
#ICS #ThreatIntel #Vulnerability
Learn to use Time Travel Debugging (TTD) to analyze obfuscated .NET malware and extract an AgentTesla payload.
-
IOCs: 4dfe67a8f1751ce0c29f7f44295e6028ad83bb8b3a7e85f84d6e251a0d7e3076
-
#MalwareAnalysis #TTD #ThreatIntel
Learn to use Time Travel Debugging (TTD) to analyze obfuscated .NET malware and extract an AgentTesla payload.
-
IOCs: 4dfe67a8f1751ce0c29f7f44295e6028ad83bb8b3a7e85f84d6e251a0d7e3076
-
#MalwareAnalysis #TTD #ThreatIntel
CISA and partners updated the Akira ransomware advisory with new TTPs, including the use of POORTRY and STONETOP malware.
-
IOCs: POORTRY, STONETOP, SystemBC
-
#Akira #Ransomware #ThreatIntel
CISA and partners updated the Akira ransomware advisory with new TTPs, including the use of POORTRY and STONETOP malware.
-
IOCs: POORTRY, STONETOP, SystemBC
-
#Akira #Ransomware #ThreatIntel
Q3 2025 saw record ransomware group fragmentation, with Qilin leading attacks and LockBit re-emerging with version 5.0.
-
IOCs: (None identified)
-
#LockBit #Qilin #Ransomware #ThreatIntel
Q3 2025 saw record ransomware group fragmentation, with Qilin leading attacks and LockBit re-emerging with version 5.0.
-
IOCs: (None identified)
-
#LockBit #Qilin #Ransomware #ThreatIntel
Lumma Stealer malware has resurged, adding browser fingerprinting to its C2 tactics for improved evasion and targeting.
-
IOCs: pabuloa. asia, jamelik. asia
-
#InfoStealer #LummaStealer #ThreatIntel
Lumma Stealer malware has resurged, adding browser fingerprinting to its C2 tactics for improved evasion and targeting.
-
IOCs: pabuloa. asia, jamelik. asia
-
#InfoStealer #LummaStealer #ThreatIntel
Microsoft's Nov. Patch Tuesday addresses 63 vulns, including 4 critical and one actively exploited Windows Kernel flaw (CVE-2025-62215).
-
IOCs: CVE-2025-62215
-
#CVE202562215 #Microsoft #PatchTuesday #ThreatIntel
Microsoft's Nov. Patch Tuesday addresses 63 vulns, including 4 critical and one actively exploited Windows Kernel flaw (CVE-2025-62215).
-
IOCs: CVE-2025-62215
-
#CVE202562215 #Microsoft #PatchTuesday #ThreatIntel
The Socket team will be at Black Hat Europe and BSides London in December to discuss software supply chain security.
-
IOCs: (None identified)
-
#BSides #BlackHat #SupplyChain #ThreatIntel
The Socket team will be at Black Hat Europe and BSides London in December to discuss software supply chain security.
-
IOCs: (None identified)
-
#BSides #BlackHat #SupplyChain #ThreatIntel
CISA released guidance for Emergency Directive 25-03, mandating immediate patching for critical Cisco ASA & Firepower vulnerabilities.
-
IOCs: CVE-2025-20333, CVE-2025-20362
-
#CVE202520333 #Cisco #ThreatIntel
CISA released guidance for Emergency Directive 25-03, mandating immediate patching for critical Cisco ASA & Firepower vulnerabilities.
-
IOCs: CVE-2025-20333, CVE-2025-20362
-
#CVE202520333 #Cisco #ThreatIntel
CISA adds three new actively exploited vulnerabilities to its KEV catalog affecting WatchGuard, Gladinet, and Microsoft products.
-
IOCs: CVE-2025-9242, CVE-2025-12480, CVE-2025-62215
-
#CISA #KEV #PatchNow #ThreatIntel
CISA adds three new actively exploited vulnerabilities to its KEV catalog affecting WatchGuard, Gladinet, and Microsoft products.
-
IOCs: CVE-2025-9242, CVE-2025-12480, CVE-2025-62215
-
#CISA #KEV #PatchNow #ThreatIntel
Legacy DLP solutions are insufficient for modern cloud environments, failing to track complex data movement and insider risks.
-
IOCs: (None identified)
-
#CloudSecurity #DLP #DataSecurity #ThreatIntel
Legacy DLP solutions are insufficient for modern cloud environments, failing to track complex data movement and insider risks.
-
IOCs: (None identified)
-
#CloudSecurity #DLP #DataSecurity #ThreatIntel
The OWASP Top 10 2025 adds 'Software Supply Chain Failures' as a new category, now ranked the #1 community concern.
-
IOCs: (None identified)
-
#AppSec #OWASP #SupplyChain #ThreatIntel
The OWASP Top 10 2025 adds 'Software Supply Chain Failures' as a new category, now ranked the #1 community concern.
-
IOCs: (None identified)
-
#AppSec #OWASP #SupplyChain #ThreatIntel
IBM and Trend Micro are co-creating an AI-driven security solution for real-time risk and compliance on IBM Z and LinuxONE mainframes.
-
IOCs: (None identified)
-
#AI #IBM #Mainframe #ThreatIntel
IBM and Trend Micro are co-creating an AI-driven security solution for real-time risk and compliance on IBM Z and LinuxONE mainframes.
-
IOCs: (None identified)
-
#AI #IBM #Mainframe #ThreatIntel
Microsoft reports progress on its Secure Future Initiative (SFI), highlighting improved MFA adoption, secure-by-default principles, and AI-driven security.
-
IOCs: (None identified)
-
#Cybersecurity #Microsoft #SFI #ThreatIntel
Microsoft reports progress on its Secure Future Initiative (SFI), highlighting improved MFA adoption, secure-by-default principles, and AI-driven security.
-
IOCs: (None identified)
-
#Cybersecurity #Microsoft #SFI #ThreatIntel
Attackers are exploiting rare, unmonitored RPC functions for authentication coercion to bypass defenses and compromise domains.
-
IOCs: (None identified)
-
#AuthenticationCoercion #RPC #ThreatIntel #Windows
Attackers are exploiting rare, unmonitored RPC functions for authentication coercion to bypass defenses and compromise domains.
-
IOCs: (None identified)
-
#AuthenticationCoercion #RPC #ThreatIntel #Windows