Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency

Seqrite Labs identified a targeted phishing campaign that exploited a stored XSS in Zimbra Collaboration (CVE-2025-66376) by embedding obfuscated JavaScript directly in an HTML email to steal session tokens, credentials, backup 2FA codes, mailbox contents (90 days) and other account data. The campaign exfiltrated data over both DNS and HTTPS to a hardcoded C2 (zimbrasoft[.]com[.]ua) and is attributed with medium confidence to APT28 given tradecraft and targeting overlaps. #SpyPress.ZIMBRA #APT28

Read More
Vidar Stealer 2.0 distributed via fake game cheats on GitHub and Reddit

Acronis TRU identified hundreds of GitHub repositories and associated campaigns distributing Vidar Stealer 2.0 and other infostealers disguised as “free game cheats,” leveraging GitHub Pages, Pastebin, Discord and Reddit to deliver staged payloads to gamers. Vidar 2.0 — a C rewrite with polymorphic builds, multithreading, advanced obfuscation and Telegram/Steam-based C2 — enables broad credential, wallet and file theft and has surged following takedowns of Lummastealer and Rhadamanthys. #Vidar #GitHub

Read More
Ransomware Tactics, Techniques, and Procedures in a Shifting Threat Landscape | Google Cloud Blog

Ransomware actors continued to evolve in 2025, with a record number of victims posted to data leak sites, increased use of data-theft extortion, continued targeting of VPNs/firewalls via vulnerability exploitation, and a notable prevalence of REDBIKE ransomware. The ecosystem showed signs of declining profitability and operational shifts—such as increased targeting of smaller organizations, use of tunnelers and RMM abuse, and integration of AI and Web3—with #REDBIKE #CLOP

Read More
Securing Autonomous AI Agents with TrendAI & NVIDIA OpenShell

The article explains how NVIDIA OpenShell and TrendAI integrate to provide governance, runtime enforcement, and visibility for deploying autonomous agentic AI safely at enterprise scale. It outlines layered defenses—pre-execution policy distribution, Agentic Scan for skill/tool risk, dynamic behavioral analysis, inline runtime enforcement, AI-specific threat inspection, and continuous monitoring—enabling secure, auditable agent…

Read More
Detecting CVE-2026-3288 & CVE-2026-24512: Ingress-nginx configuration injection vulnerabilities for Kubernetes

On March 9, 2026 the ingress-nginx project merged a fix for CVE-2026-3288, a configuration injection vulnerability in the NGINX Ingress Controller that allowed any user with permission to create or modify Ingress resources to inject arbitrary nginx directives by placing a double-quote character in the Ingress path. The flaw resulted from a missed sanitization in buildProxyPass() after a prior fix for CVE-2026-24512, can lead to RCE and secret disclosure, and Sysdig TRT published analysis plus a Falco rule to detect Ingress paths containing a double-quote. #CVE-2026-3288 #ingress-nginx

Read More

SpiderLabs, using LevelBlue OTX threat intelligence integrated with Cybereason XDR behavioral analytics, detected and blocked a suspected North Korea-linked operative who was hired through a help wanted ad after anomalous EntraID logins triggered alerts. The account was terminated within ten days following authentication anomalies from IPs 142[.]214.202.2 and 155[.]94.199.59 and an investigation found no residual access. #AstrillVPN #LazarusGroup

Read More
Fake Telegram Malware Campaign: Analysis of a Multi-Stage Loader Delivered via Typosquatted Websites

A typosquatted Telegram download site (telegrgam[.]com) distributed a malicious installer tsetup-x64.6.exe that modifies Windows Defender exclusions, drops staged payload files, and executes a DLL loader to reconstruct and run a PE payload from XML in memory. The in-memory payload communicates with a C2 at jiijua[.]com / 27.50.59.77:18852 for commands and runtime updates while using registry markers for persistence. #tsetup_x64_6_exe #AutoRecoverDat_dll

Read More
CursorJack: weaponizing Deeplinks to exploit Cursor IDE

Proofpoint researchers disclosed “CursorJack”, a proof‑of‑concept showing how Cursor IDE’s cursor:// MCP deeplinks can be abused via social engineering to install malicious MCP servers or execute arbitrary commands. In tests a single user click plus acceptance of the install prompt could fetch and run staged scripts that retrieve a Metasploit/Meterpreter payload…

Read More
Casting a Wider Net: ClickFix, Deno, and LeakNet’s Scaling Threat

Ransomware operator LeakNet has shifted from buying access to running ClickFix lures on compromised legitimate websites and introduced a Deno-based, in-memory loader that executes base64-encoded payloads, fingerprints hosts, and establishes C2 with minimal disk artifacts. After initial access the group consistently uses jli.dll DLL sideloading in C:ProgramDataUSOShared, PsExec for lateral movement, and S3 buckets for payload staging, creating repeatable detection opportunities #LeakNet #Deno

Read More
Boggy Serpens Threat Assessment

Boggy Serpens, an Iranian state-aligned cyberespionage group, has evolved its tradecraft to combine trusted-relationship compromises with AI-assisted and Rust-based tooling to target diplomatic and critical infrastructure worldwide, highlighted by a four-wave campaign against a UAE marine and energy company. Their toolkit and techniques include BlackBeard, LampoRAT, UDPGangster, Nuso and GhostBackDoor, use…

Read More
Free real estate: GoPix, the banking Trojan living off your memory

GoPix is an advanced Brazilian banking trojan that uses malvertising via Google Ads, stolen code-signing certificates, obfuscated PowerShell, memory-only implants, and short-lived C2s to target internet banking users, Pix transactions, Boleto slips, and cryptocurrency wallets. The malware executes a novel man-in-the-middle attack by using malicious PAC files and injecting trusted root certificates into browser memory while evading analysis with anti-fraud checks and in-memory execution. #GoPix #Pix

Read More
Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack

Warlock has expanded its post‑exploitation toolkit—adding TightVNC, the Yuze tunneling tool, and a persistent BYOVD technique that abuses the NSecKrnl.sys driver—to improve persistence, lateral movement, and kernel‑level defense evasion. The group continues to reuse legitimate tools (Velociraptor, VS Code tunnels, Cloudflare Tunnel, Supabase hosting, and renamed rclone) and deploys ransomware via…

Read More
LiveChat Abuse: How Phishers Are Exploiting SaaS Support Tools to Steal Sensitive Data

Cofense PDC observed a phishing campaign that uses the LiveChat SaaS platform to impersonate brands (PayPal and Amazon) and engage victims in real-time chat to harvest credentials, credit card details, MFA codes, and PII. The campaign leverages branded chat pages and redirects (lc[.]chat and other domains) to capture data and bypass MFA, demonstrating social engineering combined with SaaS abuse. #PayPal #LiveChat

Read More
Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign by the Konni Group

The Konni APT ran a multi-stage campaign using spear-phishing archives that delivered malicious LNK files to install AutoIt-based RATs (EndRAT, RftRAT, RemcosRAT), maintain long-term persistence, and steal internal documents. The actor also abused compromised KakaoTalk PC sessions to redistribute malicious files to selected contacts, highlighting the need for EDR-centered, behavior-based detection and response. #Konni #KakaoTalk

Read More