TeamFiltration Abused in Entra ID Account Takeover Campaign

A threat actor has launched a large-scale account takeover campaign using the TeamFiltration penetration testing framework to target Entra ID users across multiple cloud tenants. The campaign leverages AWS infrastructure, Microsoft Teams API, and OAuth application IDs to execute password spraying, account enumeration, and persistent access tactics. #TeamFiltration #CobaltStrike #EntraID…

Read More
Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

Ransomware actors are exploiting unpatched SimpleHelp RMM instances to target utility billing software customers, emphasizing the need for updates and threat mitigation. The attack pattern highlights ongoing vulnerabilities exploited by groups like DragonForce and others, with mitigation strategies recommended by CISA. #SimpleHelp #DragonForce…

Read More
2025 Blockchain and Cryptocurrency Threat Report: Malware in the Open Source Supply Chain

Malicious open source packages targeting blockchain developers are increasingly used to steal cryptowallet credentials, drain funds, mine cryptocurrency, and hijack clipboard data. Threat actors, including nation-state groups, exploit supply chain vulnerabilities in registries like npm and PyPI, impacting ecosystems such as Ethereum, Solana, TRON, and TON. #ContagiousInterview #BeaverTail #InvisibleFerret #XMRig #ClipboardHijackers

Read More
Operationalizing Threat Intelligence vs. Threat Hunting: What Does It Really Mean?

Today’s threat actors are increasingly sophisticated, necessitating proactive cybersecurity strategies like threat intelligence and threat hunting to defend against advanced adversaries. Operationalizing these practices within security operations enables organizations to detect unknown threats earlier and improve response times. #eSentire #ThreatHunting #ThreatIntelligence

Read More
Fog Ransomware: Unusual Toolset Used in Recent Attack

In May 2025, an unusual ransomware attack using the Fog ransomware targeted a financial institution in Asia, employing rare tools such as Syteca employee monitoring software and open-source pentesting utilities like GC2, Adaptix, and Stowaway. The attackers also established persistence on the network post-ransomware deployment, indicating possible espionage motives beyond typical ransomware objectives. #FogRansomware #Syteca #GC2 #Adaptix #Stowaway

Read More
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery

Check Point Research discovered a sophisticated malware campaign exploiting expired and deleted Discord invite links to hijack users and deliver payloads like AsyncRAT and a modified Skuld Stealer targeting cryptocurrency wallets. The attackers use multi-stage loaders, trusted cloud services, and evasion techniques, including ChromeKatz, to steal data while maintaining stealth. #AsyncRAT #SkuldStealer #DiscordInviteHijacking #ChromeKatz

Read More
Cybersecurity News | Daily Recap [12 Jun 2025]

Recent cybersecurity developments include the Warlock ransomware targeting government agencies and the Fog ransomware using advanced open-source tools to evade detection. Additionally, law enforcement operations have successfully dismantled cyber scam networks and infostealer malware infrastructures, highlighting ongoing efforts to combat cyber threats. #Warlock #FogRansomware #InterpolInfostealers #AsiaScamCrackdown

Read More
Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA), FBI, and Australian Cyber Security Centre (ACSC) released an updated advisory detailing the Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) related to the Play ransomware group, active since 2022 and responsible for widespread attacks. The advisory includes new behaviors such as…

Read More
Transparent Tribe DISGOMOJI Targeting Linux

APT-C-56, also known as Transparent Tribe, has been observed deploying a Golang-based ELF malware variant called DISGOMOJI that uses Google Drive and Google Cloud Platform for C2 communications and data exfiltration. The group targets Indian government and military personnel with sophisticated multi-stage attacks involving persistence mechanisms and credential theft. #APT-C-56 #DISGOMOJI #GoogleCloudPlatform

Read More