Skip to content
Tuesday, May 19, 2026
  • Storm-2949 Shows Cloud Breaches Start With Identity, Not Malware
  • AI Agent Governance Is Becoming a Security Control, Not a Nice-to-Have
  • SGLang RCE Flaws Show AI Inference Servers Need Real Network Isolation
  • Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Storm-2949 Shows Cloud Breaches Start With Identity, Not Malware
  • AI Agent Governance Is Becoming a Security Control, Not a Nice-to-Have
  • SGLang RCE Flaws Show AI Inference Servers Need Real Network Isolation
  • Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Editorial cybersecurity illustration of a compromised cloud identity expanding across Microsoft 365 and Azure services.

    Storm-2949 Shows Cloud Breaches Start With Identity, Not Malware

    1 hour ago
  • Cybersecurity illustration of AI agent governance with scoped permissions, approval gates, and audit evidence.

    AI Agent Governance Is Becoming a Security Control, Not a Nice-to-Have

    11 hours ago
  • Editorial cybersecurity illustration of segmented AI inference infrastructure under remote code execution risk.

    SGLang RCE Flaws Show AI Inference Servers Need Real Network Isolation

    11 hours ago
  • Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.

    Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

    1 day ago
  • Editorial illustration of AI literacy, database fundamentals, and rural cybersecurity support.

    AI Literacy Needs Fundamentals: Teaching Technology in the Real World

    1 day ago11 hours ago
  • Editorial cybersecurity illustration of an npm supply-chain compromise leaking CI and cloud secrets through DNS signals.

    node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls

    1 day ago
  • Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.

    Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

    2 days ago
  • Editorial cybersecurity illustration of device code phishing and OAuth token theft.

    Device Code Phishing Turns Legitimate Login Flows Into Token Theft

    2 days ago
  • Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.

    Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

    2 days ago
  • Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity

    PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

    3 days ago
Editorial cybersecurity illustration of a compromised cloud identity expanding across Microsoft 365 and Azure services.
  • Cyber Security Blog
  • General CTI
1 hour ago

Storm-2949 Shows Cloud Breaches Start With Identity, Not Malware

Microsoft’s Storm-2949 case study is a clean warning for SMBs and government contractors: once cloud identity and control-plane access are compromised, attackers can steal data without deploying traditional malware.

Cybersecurity illustration of AI agent governance with scoped permissions, approval gates, and audit evidence.
  • AI (General)
  • Cyber Security Blog
11 hours ago

AI Agent Governance Is Becoming a Security Control, Not a Nice-to-Have

AI agents now operate with real credentials inside business systems. Here is how SMBs and government contractors should govern identity, authority, action, and evidence before agentic workflows become unmanaged risk.

Editorial cybersecurity illustration of segmented AI inference infrastructure under remote code execution risk.
  • AI (General)
  • Cyber Security Blog
11 hours ago

SGLang RCE Flaws Show AI Inference Servers Need Real Network Isolation

CERT/CC disclosed three SGLang vulnerabilities affecting AI inference deployments, including remote code execution and path traversal risks. Here is what SMBs and government contractors should do now.

Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.
  • Cyber Security Blog
  • General CTI
1 day ago

Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

Grafana disclosed unauthorized GitHub access tied to a leaked token and codebase download. Here is what SMBs and government contractors should tighten around source-code access, CI/CD tokens, and extortion readiness.

Detecting API endpoints and source code with JS Miner
  • Bug Bounty
  • Offensive Devices / Tactics

Detecting API endpoints and source code with JS Miner

CVE-2026-21510: Windows Shell Zero-Day Exploited in the Wild to Bypass SmartScreen Protections
  • General CTI

CVE-2026-21510: Windows Shell Zero-Day Exploited in the Wild to Bypass SmartScreen Protections

AsyncRAT loader: Obfuscation, DGAs, decoys and Govno
  • Chinese Cyber Threat Intelligence
  • Malware

AsyncRAT loader: Obfuscation, DGAs, decoys and Govno

Tool of First Resort: Israel-Hamas War in Cyber
  • Detection
  • General CTI

Tool of First Resort: Israel-Hamas War in Cyber

Editorial cybersecurity illustration of a compromised cloud identity expanding across Microsoft 365 and Azure services.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Storm-2949 Shows Cloud Breaches Start With Identity, Not Malware

acint1 hour ago04 mins

Microsoft’s Storm-2949 case study is a clean warning for SMBs and government contractors: once cloud identity and control-plane access are compromised, attackers can steal data without deploying traditional malware.

Read More
Cybersecurity illustration of AI agent governance with scoped permissions, approval gates, and audit evidence.
  • AI (General)
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

AI Agent Governance Is Becoming a Security Control, Not a Nice-to-Have

acint11 hours ago04 mins

AI agents now operate with real credentials inside business systems. Here is how SMBs and government contractors should govern identity, authority, action, and evidence before agentic workflows become unmanaged risk.

Read More
Editorial cybersecurity illustration of segmented AI inference infrastructure under remote code execution risk.
  • AI (General)
  • Cyber Security Blog
  • General CTI

SGLang RCE Flaws Show AI Inference Servers Need Real Network Isolation

acint11 hours ago03 mins

CERT/CC disclosed three SGLang vulnerabilities affecting AI inference deployments, including remote code execution and path traversal risks. Here is what SMBs and government contractors should do now.

Read More
Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

acint1 day ago03 mins

Grafana disclosed unauthorized GitHub access tied to a leaked token and codebase download. Here is what SMBs and government contractors should tighten around source-code access, CI/CD tokens, and extortion readiness.

Read More
Editorial illustration of AI literacy, database fundamentals, and rural cybersecurity support.
  • AI (General)
  • Cyber Security Blog

AI Literacy Needs Fundamentals: Teaching Technology in the Real World

acint1 day ago11 hours ago07 mins

Albert LaScola reflects on teaching database systems, governance, risk management, and AI literacy through a fundamentals-first approach shaped by Navy operations, security work, Bulwark Black, and Rural Tech and Support.

Read More
Editorial cybersecurity illustration of an npm supply-chain compromise leaking CI and cloud secrets through DNS signals.
  • Cyber Security Blog
  • General CTI
  • Malware

node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls

acint1 day ago03 mins

Malicious node-ipc npm releases turned a package update into a credential-exposure event. Here is what SMBs and government contractors should check first.

Read More
Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

acint2 days ago04 mins

CISA added Microsoft Exchange Server CVE-2026-42897 to KEV after evidence of active exploitation. For SMBs and government contractors, the lesson is simple: internet-facing email infrastructure needs emergency mitigation playbooks before the patch lands.

Read More
Editorial cybersecurity illustration of device code phishing and OAuth token theft.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Device Code Phishing Turns Legitimate Login Flows Into Token Theft

acint2 days ago03 mins

Device code phishing is scaling because it abuses legitimate OAuth flows instead of simply stealing passwords. Here is what SMBs and government contractors should review now.

Read More
Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.
  • Cyber Security Blog
  • General CTI

Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

acint2 days ago04 mins

Recent Linux kernel exploit discussions show why SMBs and government contractors should reduce unused modules and services, not just wait for patches.

Read More
Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity
  • Cyber Security Blog
  • General CTI
  • Malware

PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

acint3 days ago03 mins

FortiGuard Labs reports PureLogs is being delivered through PawsRunner steganography. Here is what SMBs and government contractors should watch for defensively.

Read More
  • 1
  • 2
  • 3
  • …
  • 30

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

aad98f398d

You May Have Missed

  • General CTI

WinRAR CVE-2025-8088: Russia, China, and Cybercriminals Unite to Exploit Path Traversal Flaw

acint 4 months ago
  • General CTI

IDMerit Exposes One Billion Personal Records in Massive KYC Database Leak

acint 3 months ago
  • Russian Cyber Threat Intelligence

Diesel Vortex: Russian Cybercrime Group Steals 1,600+ Credentials From Global Logistics Sector

acint 3 months ago
  • Malware

GlassWorm ForceMemo Campaign: Stolen GitHub Tokens Used to Inject Malware Into Hundreds of Python Repositories

acint 2 months ago

    Strategic Intelligence and the Cognitive Threshold: A Multidimensional Analysis of AI Model Efficacy in 2026

    acint 3 months ago
    Dark editorial illustration of a cloud worm stealing credentials from containerized cloud infrastructure
    • Cyber Security Blog
    • General CTI

    PCPJack Shows Cloud Malware Is Moving From Cryptomining to Credential Theft

    acint 2 weeks ago
    • Malware

    Infinity Stealer: New macOS Infostealer Uses ClickFix and Nuitka Compilation to Evade Detection

    acint 2 months ago
    • General CTI

    Critical Veeam Backup Vulnerabilities Draw Ransomware Group Attention: Seven CVSS 9.9 Flaws Patched

    acint 2 months ago
    2026 Powered By BlazeThemes.