##cyberthreat
Want to stay ahead of cyber threats? @cyberalliance.bsky.social members get exclusive early access to #cyberthreat blogs, research, and reports - often 24–72 hours before the public. You can anticipate, prepare, and protect before others even know what’s coming.
Join us!
www.cyberthreatalliance.org
Home - Cyber Threat Alliance
CTA works to improve the cybersecurity of our global digital ecosystem by sharing real-time, high-quality cyber threat information.
www.cyberthreatalliance.org
October 30, 2025 at 4:46 PM
4/7
#Cybersecurity remains a top priority. Officials from the Canadian Centre for #CyberSecurity briefed the commissioners on the latest National #CyberThreat Assessment and discussed opportunities for better inter-agency co-operation to combat #OnlineThreats.
#CdnPoli
October 13, 2025 at 5:57 PM
🚨 Iranian hackers targeted the 2024 U.S. elections by stealing data from Trump's campaign & sending it to Biden-Harris associates. FBI tracking ongoing foreign meddling 🇮🇷🇺🇸 #ElectionSecurity #CyberThreat #US2024 🗳️ #StayInformed
timesofupdate.com/iranian-hack...
Iranian Hackers Target 2024 U.S. Elections, Steal Trump Campaign data, and Email Biden-Harris Associates - The Times Of Update
Iranians sent “unsolicited emails” that included stolen material that was not publicly available from former President Donald Trump’s campaign to people associated with his Democratic political rival,...
timesofupdate.com
September 19, 2024 at 3:37 PM
VanHelsing Ransomware Strikes Windows ARM and ESXi Platforms #AR #CyberCrime #CyberThreat
VanHelsing Ransomware Strikes Windows ARM and ESXi Platforms
  As part of an ongoing analysis of ransomware-as-a-service operations, a new operation known as VanHelsing has been identified. This operation demonstrates a sophisticated multi-platform capability, posing a significant cybersecurity threat. This new strain of ransomware is designed to be able to compromise a wide range of systems, including Windows, Linux, BSD, ARM and ESXi, highlighting how adaptable and powerful the malware is. During the spring of 2025, VanHelsing became highly visible in underground cybercriminal forums, where it was actively promoted to potential affiliates. The most significant aspect of the program was the fact that experienced cybercriminals were given free access, while those with less expertise were required to pay a $5,000 deposit as a condition to participate. In this case, the targeted recruitment strategy seems to be a calculated one to attract both seasoned and aspiring threat actors to expand the scope of the ransomware's operational capabilities.  A few weeks back, cybersecurity firm CYFIRMA first revealed the existence of VanHelsing, providing insight into its emergence and early stages. The findings of Check Point Research's extensive technical analysis, published yesterday in the journal Security Research, provide a more in-depth understanding of the ransomware's mechanics as well as its operational framework, which was published following this discovery. It has become apparent that VanHelsingRaaS is spreading rapidly, raising serious concerns among cybersecurity professionals.  Just two weeks after the ransomware launched, three confirmed victims of the ransomware have been successfully compromised. This virus has already gone through further development and has already been redeveloped into a more advanced version. The speed at which it has developed highlights how powerful it could become within the cyber threat landscape, and it warrants security professionals around the world to be vigilant and take proactive measures to combat it.  While the ransomware is still evolving, multiple infections have already been detected, which indicates that it has been deploying rapidly in real-world attacks. To investigate several variants, which have so far been restricted to the Windows platform, cybersecurity researchers have conducted an in-depth examination. All of these variants have been identified as being based on Windows. A notable aspect of the malware is that it has been improved incrementally with each subsequent iteration, which suggests that the malware is constantly being improved.  It is clear from the frequent updates and rapid progress of the ransomware that the developers are committed to expanding their capabilities, and this raises concerns regarding its potential impact as the ransomware matures. According to the available evidence, VanHelsing ransomware was first found in the wild on March 16, when the ransomware was first detected in the wild. To secure the files within this malware, a 32-byte (256-bit) symmetric key and a 12-byte nonce are generated for each file by the ChaCha20 encryption algorithm.  In addition, VanHelsing also encrypts these generated values with the use of an embedded Curve25519 public key to further enhance its encryption processes. These encrypted keys and nonces are then embedded in the affected file to make them more secure. A notable feature of VanHelsing is its extensive command-line interface (CLI) customization that enables attackers to tailor the attack to meet the specific requirements of their target users.  Files that exceed 1GB in size are subjected to partial encryption, while smaller files are subjected to complete encryption. As part of this method, drives and folders will be selected, encryption parameters will be set, the attack will spread via SMB protocol, shadow copy deletions will be bypassed, and evasion will be performed in a dual-phase stealth mode. VanHelsing utilizes two types of encryption to provide high levels of security.  It is a standardized encryption technique in which it systematically enumerates directories, encrypts file content, and then renames the affected files using the ".vanhelsing" extension. On the other hand, when in stealth mode, both the encryption and file renaming are performed in separate processes, thus minimizing detection risks since the encryption process mimics normal file input/output (I/O) activity to minimize detection risk. During the renaming phase of the data, security tools might detect anomalies, but by that time the data is already encrypted in full. However, Check Point has identified several shortcomings in its code development that have been attributed to immature development despite its advanced functionality and rapid evolution. There are many reasons for this, including inconsistency in file extensions, flaws in exclusion list logic that could lead to duplicate encryption cycles, and several command-line flags that have not been implemented yet.  Despite VanHelsing's many technical imperfections, it remains a formidable emerging cyber threat. Considering that it is a continuously evolving threat, security professionals and organizations must keep their eyes open for potential threats associated with this ransomware variant as it is developing. In recent years, van Helsing ransomware has emerged as an extremely sophisticated cyber threat that can be used against multiple platforms, including Windows, Linux, BSD, ARM, and ESXi, and is rapidly evolving.  With its advanced encryption techniques, extensive CLI customization, and stealth tactics, this ransomware can be a formidable weapon in the hands of cybercriminals. There is strong evidence that the ransomware is actively spread through underground forums, as well as its recruitment strategy. Security researchers have noted that it is rapidly iterating and improving, making proactive defence measures imperative.  Although VanHelsing may have been developed with technical flaws, it remains an incredibly dangerous threat due to its ability to spread rapidly and adapt quickly. Organizations must maintain an effective cybersecurity strategy, stay informed about emerging threats, and enhance their defences to avoid potential risks. The evolving nature of this ransomware emphasizes the need.
dlvr.it
March 31, 2025 at 3:54 PM
🚨 Texas Cyber Incident
Sugar Land, TX confirms a cyberattack impacting city services like bill pay and permits.
Critical systems (911, police, fire) remain functional.
Texas has seen repeated ransomware hits across multiple cities in 2025.

#CyberAttack #InfoSec #CyberThreat #CyberAlert
October 11, 2025 at 6:48 AM
[ 1M - $150/HR - JRPG/LIFE SIM GAME - PC ]

We’re pleased to announce that the PUBLIC CASTING CALL for THEO in #CyberThreat (@cyberthreat.bsky.social) is now OPEN!

Please submit all auditions by 5PM UK-TIME, WEDNESDAY THE 30TH OF OCTOBER!

docs.google.com/document/d/1...
October 16, 2024 at 4:45 PM
Oracle Cloud breach? Threat actor selling 6M records. Oracle denies, but CloudSEK found proof challenging the denial. Your sensitive data could be exposed! Trust the data. Read the analysis: www.cloudsek.com/blog/part-2-... #OracleExposed #DataSecurity #CheckYourData #CyberThreat
April 6, 2025 at 4:06 PM
China’s not just spying—they’re probing our power grids, pipelines, and ports. This isn’t digital snooping—it’s laying the groundwork to flip the switch if conflict breaks out.
#China #CyberThreat
#USInfrastructure
#Espionage #USA
#NationalSecurity osintdaily.blogspot.com/2023/12/chin...
China's Covert Cyber Espionage Strikes U.S. Infrastructure
A blog about the 17 spy agencies comprising the US Intelligence Community
osintdaily.blogspot.com
April 19, 2025 at 2:37 PM
Screw it, it's been a while, have a #screenshotsaturday dump! Working on updated 3D character models and experimenting with improving scene lighting for #CyberThreat recently. You can even see the progress on some of the characters from the upcoming casting call!
August 16, 2025 at 10:27 PM
🚨 A major alert: F5 Networks confirms a long-term breach by a nation-state actor who stole source code and vulnerability data from its BIG-IP systems—now calling thousands of networks “at imminent risk.”

www.geekwire.com/2025/f5-disc...

#CyberThreat #NationStateHack
F5 discloses major security breach linked to nation-state hackers
The Seattle-based company disclosed the incident Wednesday in an SEC filing and a customer memo, saying the attacker maintained “long-term, persistent access” to some of its product development and en...
www.geekwire.com
October 20, 2025 at 6:17 AM
🚨The October 2025 #ThreatsploitAdversaryReport is here!

Discover how AI-driven ransomware & supply chain disruptions are reshaping the threat landscape.

💡Download: briskinfosec.com/assets/threa...

#CybersecurityAwarenessMonth #CyberThreat #cyberattacks #Databreach #Vulnerability #CVE
October 9, 2025 at 7:21 AM
New FBI/CISA/HHS/MS‑ISAC warning: Interlock is hitting critical infrastructure across the US & EU.

Full story via CSO Online: www.csoonline.com/article/4027...

#Ransomware #CyberThreat #CyberSecurity #CyberAdvisory
Interlock ransomware threat expands across the US and Europe, hits healthcare and smart cities
A new joint advisory by the FBI, HHS, and CISA reveals how Interlock’s psychological manipulation and rare entry vectors like drive-by downloads and fake system fixes are reshaping ransomware defense…
www.csoonline.com
July 23, 2025 at 1:25 PM
Freins psychologiques : Les employeurs pourraient douter de la capacité à respecter les règles ou à résister à des pressions malveillantes (ex. corruption, chantage). #CyberConfiance #CyberThreat #CyberBlackmail #CyberChantage #RiskIT #CyberSecurity #DataBreach #CorporateCompliance
May 6, 2025 at 9:36 AM
The #Cybersecurity Information Sharing Act of 2015 (#CISA 2015) #expired due to the government #shutdown, leaving #USnetworks #vulnerable. The law facilitated #cyberthreat information sharing, providing legal protections for companies. The #expiration complicates sharing, aiding adversaries like…
October 4, 2025 at 5:46 PM
AIMindUpdate News!
GitHub users beware! "Banana Squad" is injecting malware into popular repos. Protect your code now! #GitHubSecurity #MalwareAlert #CyberThreat

Click here↓↓↓
aimindupdate.com/2025/06/22/g...
aimindupdate.com
June 23, 2025 at 9:01 AM
Дружелюбная безопасность для недружелюбного мира Современный цифровой мир полон возможностей, но и угроз....

#cybersecurity #cyberthreat

Origin | Interest | Match
October 2, 2025 at 10:40 AM
Traditional SOC techniques are no longer enough to mitigate today's advanced cyber threats. 👨‍💻

It's time to bolster your defense by leveraging #OSINT to hunt digital adversaries before they attack your organization.👊
bit.ly/3WlIA33

#CTI #cyberthreat #cybercrime
July 25, 2024 at 9:35 PM
8/14 A former US Joint Task Forces operative who tracked Russian cyber threats called the development "truly shocking," noting: "Russia is at least on par with China as the most significant cyber threat."
#Russia #Cyberthreat #Intelligence
February 28, 2025 at 8:41 PM
We've landed in Berlin for FIRST's 2025 Cyber Threat Intelligence Conference! Come see us in the exhibition hall if you're around 🕵️

#FIRSTCTI25 #cyberthreat #CTI
April 23, 2025 at 9:05 AM
🚨 The Obscura ransomware group has launched a new leak site on the dark web, exposing six new victims.
Are leak sites becoming the most dangerous extortion tactic in ransomware?
💬 Share your take & follow @technadu.com for more cyber threat updates.
#ObscuraRansomware #DarkWeb #CyberThreat #Huntress
September 5, 2025 at 1:08 PM
IT warning after hackers close 160-year-old firm
www.bbc.co.uk/news/article...

Director of 160yo haulage firm put out of business by #cyberattack urges companies to be on guard.
#CyberSecurity #InfoSec #CyberThreat #DisasterRecovery #DataProtection
IT warning after hackers close 160-year-old firm in Kettering
It comes as Marks & Spencer and the Co-op recover from disruption caused by cyber-attacks.
www.bbc.co.uk
May 7, 2025 at 3:14 PM