Skip to content
Sunday, May 17, 2026
  • Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
  • AI Literacy Needs Fundamentals: Teaching Technology in the Real World
  • node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls
  • Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
  • AI Literacy Needs Fundamentals: Teaching Technology in the Real World
  • node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls
  • Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.

    Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

    35 minutes ago
  • Editorial illustration of AI literacy, database fundamentals, and rural cybersecurity support.

    AI Literacy Needs Fundamentals: Teaching Technology in the Real World

    3 hours ago3 hours ago
  • Editorial cybersecurity illustration of an npm supply-chain compromise leaking CI and cloud secrets through DNS signals.

    node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls

    5 hours ago
  • Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.

    Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

    20 hours ago
  • Editorial cybersecurity illustration of device code phishing and OAuth token theft.

    Device Code Phishing Turns Legitimate Login Flows Into Token Theft

    1 day ago
  • Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.

    Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

    1 day ago
  • Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity

    PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

    2 days ago
  • Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis

    BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

    2 days ago
  • Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.

    Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

    2 days ago
  • Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.

    Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

    3 days ago
Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.
  • Cyber Security Blog
  • General CTI
35 minutes ago

Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

Grafana disclosed unauthorized GitHub access tied to a leaked token and codebase download. Here is what SMBs and government contractors should tighten around source-code access, CI/CD tokens, and extortion readiness.

Editorial illustration of AI literacy, database fundamentals, and rural cybersecurity support.
  • AI (General)
  • Cyber Security Blog
3 hours ago3 hours ago

AI Literacy Needs Fundamentals: Teaching Technology in the Real World

Albert LaScola reflects on teaching database systems, governance, risk management, and AI literacy through a fundamentals-first approach shaped by Navy operations, security work, Bulwark Black, and Rural Tech and Support.

Editorial cybersecurity illustration of an npm supply-chain compromise leaking CI and cloud secrets through DNS signals.
  • Cyber Security Blog
  • General CTI
5 hours ago

node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls

Malicious node-ipc npm releases turned a package update into a credential-exposure event. Here is what SMBs and government contractors should check first.

Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.
  • Cyber Security Blog
  • General CTI
20 hours ago

Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

CISA added Microsoft Exchange Server CVE-2026-42897 to KEV after evidence of active exploitation. For SMBs and government contractors, the lesson is simple: internet-facing email infrastructure needs emergency mitigation playbooks before the patch lands.

Metro4Shell: Critical React Native CLI Vulnerability Actively Exploited to Deploy Malware
  • General CTI

Metro4Shell: Critical React Native CLI Vulnerability Actively Exploited to Deploy Malware

CL-STA-1087: Chinese APT Targets Southeast Asian Militaries with AppleChris and MemFun Backdoors
  • Chinese Cyber Threat Intelligence

CL-STA-1087: Chinese APT Targets Southeast Asian Militaries with AppleChris and MemFun Backdoors

CVE-2026-24061: 11-Year-Old GNU Telnetd Vulnerability Grants Instant Root Access
  • Operational Technology (OT)

CVE-2026-24061: 11-Year-Old GNU Telnetd Vulnerability Grants Instant Root Access

Pro-Iranian Hackers Expand Targeting of US Critical Infrastructure as Cyber Chaos Escalates
  • Iranian Cyber Threat Intelligence

Pro-Iranian Hackers Expand Targeting of US Critical Infrastructure as Cyber Chaos Escalates

Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

acint35 minutes ago03 mins

Grafana disclosed unauthorized GitHub access tied to a leaked token and codebase download. Here is what SMBs and government contractors should tighten around source-code access, CI/CD tokens, and extortion readiness.

Read More
Editorial illustration of AI literacy, database fundamentals, and rural cybersecurity support.
  • AI (General)
  • Cyber Security Blog

AI Literacy Needs Fundamentals: Teaching Technology in the Real World

acint3 hours ago3 hours ago07 mins

Albert LaScola reflects on teaching database systems, governance, risk management, and AI literacy through a fundamentals-first approach shaped by Navy operations, security work, Bulwark Black, and Rural Tech and Support.

Read More
Editorial cybersecurity illustration of an npm supply-chain compromise leaking CI and cloud secrets through DNS signals.
  • Cyber Security Blog
  • General CTI
  • Malware

node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls

acint5 hours ago03 mins

Malicious node-ipc npm releases turned a package update into a credential-exposure event. Here is what SMBs and government contractors should check first.

Read More
Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

acint20 hours ago04 mins

CISA added Microsoft Exchange Server CVE-2026-42897 to KEV after evidence of active exploitation. For SMBs and government contractors, the lesson is simple: internet-facing email infrastructure needs emergency mitigation playbooks before the patch lands.

Read More
Editorial cybersecurity illustration of device code phishing and OAuth token theft.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Device Code Phishing Turns Legitimate Login Flows Into Token Theft

acint1 day ago03 mins

Device code phishing is scaling because it abuses legitimate OAuth flows instead of simply stealing passwords. Here is what SMBs and government contractors should review now.

Read More
Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.
  • Cyber Security Blog
  • General CTI

Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

acint1 day ago04 mins

Recent Linux kernel exploit discussions show why SMBs and government contractors should reduce unused modules and services, not just wait for patches.

Read More
Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity
  • Cyber Security Blog
  • General CTI
  • Malware

PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

acint2 days ago03 mins

FortiGuard Labs reports PureLogs is being delivered through PawsRunner steganography. Here is what SMBs and government contractors should watch for defensively.

Read More
Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

acint2 days ago04 mins

GTIG reports UNC6671 / BlackFile is using vishing, AiTM phishing, and SaaS data theft to extort organizations. Here is what SMBs and government contractors should harden now.

Read More
Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.
  • Cyber Security Blog
  • General CTI
  • Malware

Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

acint2 days ago04 mins

Unit 42 reports Gremlin Stealer has evolved with resource-file obfuscation, session hijacking, Discord token theft, and crypto clipboard fraud. Here is what SMBs and government contractors should do defensively.

Read More
Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.
  • Cyber Security Blog
  • General CTI

Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

acint3 days ago04 mins

Cisco Talos reports active exploitation of Catalyst SD-WAN authentication bypass and related vulnerabilities. Here is what SMBs and government contractors should prioritize now.

Read More
  • 1
  • 2
  • 3
  • …
  • 30

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

eef38d6874

You May Have Missed

  • General CTI
  • Offensive Devices / Tactics

THIS WEEK IN SECURITY: LOOP DOS, FLIPPER RESPONDS, AND MORE!

bulwarkblack 2 years ago2 years ago
  • General CTI

FortiGate Devices Exploited as Network Entry Points for Service Account Credential Theft

acint 2 months ago
  • Operational Technology (OT)

Iconics Suite SCADA Vulnerability Enables Denial-of-Service Through Privileged File Operations

acint 4 months ago4 months ago
  • Malware

JavaScript Malware: 50,000+ Bank Users at Risk Worldwide

bulwarkblack 2 years ago2 years ago
  • Makes you Think

The Game Is Life… But What If That’s Not Just Fiction?

Roscoe Flock 1 year ago1 year ago
  • Operational Technology (OT)

Global Energy Systems Exposed: Widespread Cybersecurity Gaps Found in Power Grid OT Networks

acint 4 months ago4 months ago
  • Iranian Cyber Threat Intelligence

Seedworm APT Deploys Dindoor and Fakeset Backdoors Inside US Critical Infrastructure Networks

acint 2 months ago

    ShinyHunters Claims 350GB Data Theft from European Commission’s AWS Cloud Infrastructure

    acint 2 months ago
    2026 Powered By BlazeThemes.