Skip to content
Friday, May 15, 2026
  • BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough
  • Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets
  • Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review
  • Kazuar Shows Russian Espionage Malware Is Engineering for Resilience
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough
  • Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets
  • Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review
  • Kazuar Shows Russian Espionage Malware Is Engineering for Resilience
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis

    BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

    1 hour ago
  • Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.

    Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

    6 hours ago
  • Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.

    Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

    20 hours ago
  • Editorial cybersecurity illustration of a modular Russian espionage botnet architecture with covert command-and-control paths.

    Kazuar Shows Russian Espionage Malware Is Engineering for Resilience

    1 day ago
  • Editorial cybersecurity illustration of exposed AI applications and cloud-native workloads at risk from misconfiguration

    Exposed AI Apps Turn Misconfiguration Into RCE Risk

    1 day ago
  • Professional cybersecurity illustration of defenders prioritizing Microsoft Patch Tuesday vulnerabilities across servers and identity systems.

    May 2026 Patch Tuesday: How SMBs Should Prioritize 132 Microsoft CVEs

    2 days ago
  • Editorial cybersecurity illustration of ransomware-as-a-service infrastructure exposed by a leaked backend database.

    The Gentlemen RaaS Leak Shows Ransomware Is Still an Edge-Device Problem

    2 days ago
  • Cybersecurity illustration of a trusted software download site being abused to deliver poisoned installers in a supply chain attack.

    JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification

    6 days ago
  • Editorial cybersecurity illustration of a fake AI model repository hiding an infostealer attack chain.

    Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here

    6 days ago
  • Abstract cybersecurity illustration of AI agent tool calls crossing into shell command execution and defensive containment controls.

    MCP Server Command Injection Shows Why AI Tools Need Real Isolation

    7 days ago
Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis
  • Cyber Security Blog
  • General CTI
1 hour ago

BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

GTIG reports UNC6671 / BlackFile is using vishing, AiTM phishing, and SaaS data theft to extort organizations. Here is what SMBs and government contractors should harden now.

Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.
  • Cyber Security Blog
  • General CTI
6 hours ago

Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

Unit 42 reports Gremlin Stealer has evolved with resource-file obfuscation, session hijacking, Discord token theft, and crypto clipboard fraud. Here is what SMBs and government contractors should do defensively.

Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.
  • Cyber Security Blog
  • General CTI
20 hours ago

Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

Cisco Talos reports active exploitation of Catalyst SD-WAN authentication bypass and related vulnerabilities. Here is what SMBs and government contractors should prioritize now.

Editorial cybersecurity illustration of a modular Russian espionage botnet architecture with covert command-and-control paths.
  • Cyber Security Blog
  • General CTI
1 day ago

Kazuar Shows Russian Espionage Malware Is Engineering for Resilience

Microsoft reports that Kazuar, attributed to Russian state actor Secret Blizzard, has evolved into a modular P2P botnet. Here is what SMBs and government contractors should take from it defensively.

Exposed AI Apps Turn Misconfiguration Into RCE Risk
  • AI (General)
  • Cyber Security Blog

Exposed AI Apps Turn Misconfiguration Into RCE Risk

Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the GlobeTurkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe
  • General CTI
  • Global Cyber Threat Intelligence

Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the GlobeTurkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe

Global Energy Systems Exposed: Widespread Cybersecurity Gaps Found in Power Grid OT Networks
  • Operational Technology (OT)

Global Energy Systems Exposed: Widespread Cybersecurity Gaps Found in Power Grid OT Networks

How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation
  • Business
  • Red Teaming

How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation

Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

acint1 hour ago04 mins

GTIG reports UNC6671 / BlackFile is using vishing, AiTM phishing, and SaaS data theft to extort organizations. Here is what SMBs and government contractors should harden now.

Read More
Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.
  • Cyber Security Blog
  • General CTI
  • Malware

Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

acint6 hours ago04 mins

Unit 42 reports Gremlin Stealer has evolved with resource-file obfuscation, session hijacking, Discord token theft, and crypto clipboard fraud. Here is what SMBs and government contractors should do defensively.

Read More
Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.
  • Cyber Security Blog
  • General CTI

Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

acint20 hours ago04 mins

Cisco Talos reports active exploitation of Catalyst SD-WAN authentication bypass and related vulnerabilities. Here is what SMBs and government contractors should prioritize now.

Read More
Editorial cybersecurity illustration of a modular Russian espionage botnet architecture with covert command-and-control paths.
  • Cyber Security Blog
  • General CTI
  • Malware
  • Russian Cyber Threat Intelligence

Kazuar Shows Russian Espionage Malware Is Engineering for Resilience

acint1 day ago04 mins

Microsoft reports that Kazuar, attributed to Russian state actor Secret Blizzard, has evolved into a modular P2P botnet. Here is what SMBs and government contractors should take from it defensively.

Read More
Editorial cybersecurity illustration of exposed AI applications and cloud-native workloads at risk from misconfiguration
  • AI (General)
  • Cyber Security Blog
  • General CTI

Exposed AI Apps Turn Misconfiguration Into RCE Risk

acint1 day ago04 mins

Microsoft warns that publicly exposed AI apps, MCP servers, and Kubernetes-hosted agent tooling can turn weak defaults into practical paths for RCE, credential theft, and data exposure.

Read More
Professional cybersecurity illustration of defenders prioritizing Microsoft Patch Tuesday vulnerabilities across servers and identity systems.
  • Cyber Security Blog
  • General CTI

May 2026 Patch Tuesday: How SMBs Should Prioritize 132 Microsoft CVEs

acint2 days ago04 mins

Microsoft’s May 2026 Patch Tuesday shipped 132 CVEs. Here is how SMBs and government contractors should prioritize identity, server, and Office risks first.

Read More
Editorial cybersecurity illustration of ransomware-as-a-service infrastructure exposed by a leaked backend database.
  • Cyber Security Blog
  • General CTI
  • Malware

The Gentlemen RaaS Leak Shows Ransomware Is Still an Edge-Device Problem

acint2 days ago04 mins

Check Point’s look inside The Gentlemen ransomware operation is a useful reminder for SMBs and government contractors: exposed edge appliances, weak identity controls, and unmanaged remote access paths still drive real ransomware risk.

Read More
Cybersecurity illustration of a trusted software download site being abused to deliver poisoned installers in a supply chain attack.
  • Cyber Security Blog
  • General CTI
  • Malware

JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification

acint6 days ago05 mins

Attackers swapped selected JDownloader website download links with malicious installers. Here is what SMB and government-contractor defenders should do about trusted-download risk.

Read More
Editorial cybersecurity illustration of a fake AI model repository hiding an infostealer attack chain.
  • AI (General)
  • Cyber Security Blog
  • General CTI
  • Malware
  • Social Engineering

Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here

acint6 days ago04 mins

A fake OpenAI Privacy Filter repository on Hugging Face delivered Windows infostealer malware. Here is what SMB and gov-contractor defenders should take from it.

Read More
Abstract cybersecurity illustration of AI agent tool calls crossing into shell command execution and defensive containment controls.
  • AI (General)
  • Cyber Security Blog
  • General CTI

MCP Server Command Injection Shows Why AI Tools Need Real Isolation

acint7 days ago03 mins

A critical GitHub advisory for @profullstack/mcp-server shows how unsafe AI tool endpoints can turn domain lookup functionality into unauthenticated remote code execution.

Read More
  • 1
  • 2
  • 3
  • …
  • 29

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

b3e2d4a8fe

You May Have Missed

  • Chinese Cyber Threat Intelligence

Google Blocks Massive Model Extraction Campaign Targeting Gemini AI with 100,000+ Malicious Prompts

acint 3 months ago
  • Becoming Self Sufficient

The AI Edge: Outthinking the Chaos

bulwarkblack 1 year ago1 year ago
  • Iranian Cyber Threat Intelligence

Iranian Handala Hacktivists Deploy Wiper Malware Against Medical Device Giant Stryker

acint 2 months ago
  • General CTI
  • Malware

APT28 Targets European Entities with Operation MacroMaze Webhook Malware Campaign

acint 3 months ago
  • Operational Technology (OT)

Qilin Ransomware Hits Romania’s National Oil Pipeline Operator Conpet, Claims Nearly 1 TB Data Theft

acint 3 months ago
  • Training

THE BUG HUNTERS METHODOLOGY LIVE

bulwarkblack 2 years ago2 years ago
  • General CTI

AI-Powered Attack Achieves AWS Admin Access in Under 10 Minutes: A New Era of Automated Intrusions

acint 3 months ago
  • General CTI
  • Malware

Fake Google Security Check Transforms Browser Into Surveillance Toolkit via PWA Installation

acint 2 months ago
2026 Powered By BlazeThemes.