The Beast Returns: Analysis of a Beast Ransomware Server

Team Cymru discovered an open directory on 5.78.84[.]144 that contained a full Beast ransomware operator toolkit, revealing tools and binaries used across reconnaissance, credential theft, lateral movement, exfiltration, and cleanup. The collection included Windows and Linux Beast binaries, scripts to disable backups and wipe traces, and evidence of data exfiltration workflows…

Read More
Over 500 MB of Stolen Italian Identity Documents Released on Telegram

A RAR archive exceeding 500 MB containing exactly 500 scanned Italian identity documents (identity cards, passports, driving licences) and selfie identification photos was published on a Telegram channel signing as “Anonymous Algeria”, active since November 2025. CERT-AGID notes most files date from 2020–2021, that the dataset may be recycled material consistent with INPS-themed smishing campaigns, and urges reporting, SPID checks, and careful monitoring of bank accounts. #AnonymousAlgeria #CERTAGID

Read More
Elastic Security Integrations Roundup: Q1 2026

Elastic announced nine new Elastic Security integrations that expand visibility and normalization across macOS, cloud services, email protection, identity and SIEM platforms, each shipping with ingest pipelines and prebuilt dashboards for immediate use. Highlights include macOS Security Events, IBM QRadar migration, Proofpoint Essentials, AWS Security Hub, JupiterOne, Airlock Digital, Island Browser, Ironscales, and Cyera with ECS/OCSF normalization and built-in support for ES|QL, Attack Discovery and the AI Assistant. #macOS #IBMQRadar

Read More
Industrial Cybersecurity Risks from Internet-Exposed ICS Devices

Team Cymru analyzed internet-exposed ICS/OT devices and presented three case studies showing nation-state actors targeting Hitachi RTU560, Moxa NPort, and Rockwell 1756 modules using default credentials, corrupted firmware uploads, device lockout, and protocol exploits. The research highlights thousands of exposed devices—particularly Rockwell and Moxa components—being scanned and targeted, and recommends using…

Read More
DPRK Malware Modularity: Diversity and Functional Specialization

North Korea’s cyber program is a deliberately fragmented, mission-aligned malware ecosystem that treats toolchains as consumable assets to enable parallel espionage, revenue generation, and disruptive operations. This compartmentalized portfolio model increases operational resilience, complicates attribution, and prioritizes rapid tool churn over long-lived platforms #Lazarus #Kimsuky

Read More
That dream job offer from Coca-Cola or Ferrari? It’s a trap for your passwords

Two coordinated phishing campaigns impersonating Coca-Cola and Ferrari use polished booking and careers pages to harvest credentials via fake login prompts and social-login pages. The Coca-Cola kit notably includes a fake Chrome window that relays credentials and MFA challenges in real time to an attacker-controlled backend, enabling account takeover; the Ferrari…

Read More
Keep your finger on Pulse. Mythic Likho cyberattacks against Russia’s critical information infrastructure

The loader component of ReflectPulse extracts configuration from Dropper 2, optionally encrypts and stores the agent module in memory, and uses configured polling intervals to initiate C2 communication over HTTP GET or POST. ReflectPulse supports a stealth mode that encrypts configuration and XOR-repacks each parameter to hinder process memory dump analysis, and the loader can wait for an encrypted agent module from the C2 before authorizing decryption and execution #ReflectPulse #Dropper2

Read More
The Week in Vulnerabilities: AI Frameworks, VMware, and Critical ICS Exposure

This week’s intelligence highlights critical vulnerabilities across AI frameworks, VMware environments, Kubernetes, EV charging platforms, and industrial control systems that expand the global attack surface and increase exploitation risk. Notable high-risk flaws include RCEs in Wazuh and Cisco FMC, a critical deserialization bug in Langflow, and widespread ICS/EV exposures now tracked in CISA’s KEV catalog. #Wazuh #Langflow

Read More
New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay

The article analyzes BPFDoor-derived implants (icmpShell/httpShell and multiple Rapid7 variants) that use custom BPF filters, protocol sniffing, and protocol-tunneling C2 to achieve stealthy remote shells and persistence. It highlights key artifacts such as the RC4 key “icmp”, hardcoded ICMP Sequence Number 1234, and active beaconing domains that masquerade as NTP-over-SSL. #BPFDoor #icmpShell

Read More
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments

Microsoft Security Copilot augments Microsoft Defender capabilities to help security teams investigate web shell and post-compromise incidents by analyzing obfuscated or encoded scripts and accelerating triage. Defender coverage and prebuilt/hunting queries target cron-based persistence, PHP webshells (e.g., index.php), base64-encoded payloads, and hosting-control-panel abuse to detect and block threats. #WebShell #MicrosoftSecurityCopilot

Read More
How we caught the Axios supply chain attack

The author built a proof-of-concept AI-driven monitor that diffs package releases and flagged a malicious npm compromise of Axios that used a phantom dependency with a postinstall hook to deploy cross-platform malware. The incident ties into a wider supply-chain campaign (Trivy → LiteLLM → Telnyx → Axios) attributed to TeamPCP, prompting coordinated detection, takedown, and recommendations for registry monitoring and release soak times. #Axios #TeamPCP

Read More