RENDERSHOCK: WEAPONIZING TRUST IN FILE RENDERING PIPELINES

RenderShock is a zero-click attack framework that exploits passive file preview, indexing, and automation in modern operating systems to execute malicious payloads without user interaction. It leverages trusted system features to perform reconnaissance, credential theft, remote code execution, and persistence, posing significant stealth and detection challenges. #RenderShock #NTLMLeak #RemoteTemplateInjection

Read More
Fix the Click: Preventing the ClickFix Attack Vector

The article explores the rising threat of ClickFix campaigns, detailing how attackers use social engineering to trick users into executing malicious commands across various industries in 2025. It highlights prominent campaigns delivering NetSupport RAT, Latrodectus, and Lumma Stealer malware and provides hunting and mitigation strategies to combat these threats. #ClickFix #NetSupportRAT…

Read More
Detecting Authorization Flaws in Java Spring via Source Code Review (SCR)

Privilege escalation vulnerabilities in Java Spring applications often evade dynamic testing but can be effectively detected through secure code review by analyzing authorization logic in the source code. This article outlines authorization implementation patterns in Spring Security and provides a practical step-by-step guide for identifying and mitigating authorization flaws during code review. #JavaSpring #PrivilegeEscalation #SecureCodeReview

Read More
Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Three real-world cloud compromises affecting Microsoft Azure and Amazon Web Services environments were analyzed, revealing threat actors using stolen credentials to gain unauthorized access, exfiltrate data, and deploy ransomware. The cases highlight the importance of AI-driven anomaly detection and autonomous response to contain attacks and prevent escalation. #MicrosoftAzure #AmazonWebServices #Rclone #AkiraRansomware

Read More
SafePay ransomware: The fast-rising threat targeting MSPs

SafePay ransomware rapidly emerged in early 2025 as a highly active and dangerous threat, targeting over 200 victims worldwide, including managed service providers and SMBs. It employs sophisticated techniques such as disabling endpoint protections, exfiltrating data via network shares, and encrypting files using a combination of AES and RSA, with many similarities to the LockBit ransomware family. #SafePay #LockBit #IngramMicro

Read More
Beyond the Breach: Cutting Through Noise to Focus on Real Threats

This article examines the prevalence of misleading and recycled data breaches in threat intelligence, highlighting how such noise complicates effective cybersecurity response. It provides a framework to differentiate genuine threats from false alarms caused by sensationalized reports, underground forums, and fabricated datasets. #16BillionCredentialLeak #BreachForums #ICMRDataLeak

Read More
Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West

Pay2Key.I2P, an Iranian-backed ransomware-as-a-service linked to the Fox Kitten APT group and Mimic ransomware, has rapidly expanded its operations targeting Western organizations with ideological motives. The ransomware includes advanced evasion techniques and recently added Linux targeting, collecting over $4 million in ransom payments within four months. #Pay2Key.I2P #FoxKitten #MimicRansomware

Read More
Count(er) Strike – Data Inference Vulnerability in ServiceNow

Varonis Threat Labs discovered a critical vulnerability named Count(er) Strike in ServiceNow’s platform that allowed minimal-access users to infer and exfiltrate sensitive data across multiple tables. ServiceNow addressed the issue by releasing security updates and introducing new access control mechanisms like Query ACLs and Security Data Filters. #CounterStrike #ServiceNow #CVE-2025-3648…

Read More
Cato CTRL™ Threat Research: Overview of BloodHound and Associated Collectors Including ShadowHound, SharpHound, and SoapHound 

BloodHound and its associated collectors—SharpHound, SoapHound, and ShadowHound—are powerful tools used to analyze and visualize Active Directory relationships, identifying potential attack paths and privilege escalation routes within networks. These tools, employed by advanced threat actors such as the Ryuk and Play ransomware gangs, enable both attackers and defenders to discover vulnerabilities related to permissions, misconfigurations, and domain structures. #BloodHound #SharpHound #SoapHound #ShadowHound #Ryuk #PlayRansomware

Read More