Skip to content
Sunday, May 17, 2026
  • Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation
  • Device Code Phishing Turns Legitimate Login Flows Into Token Theft
  • Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority
  • PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation
  • Device Code Phishing Turns Legitimate Login Flows Into Token Theft
  • Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority
  • PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.

    Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

    1 hour ago
  • Editorial cybersecurity illustration of device code phishing and OAuth token theft.

    Device Code Phishing Turns Legitimate Login Flows Into Token Theft

    6 hours ago
  • Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.

    Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

    11 hours ago
  • Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity

    PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

    1 day ago
  • Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis

    BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

    1 day ago
  • Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.

    Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

    1 day ago
  • Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.

    Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

    2 days ago
  • Editorial cybersecurity illustration of a modular Russian espionage botnet architecture with covert command-and-control paths.

    Kazuar Shows Russian Espionage Malware Is Engineering for Resilience

    2 days ago
  • Editorial cybersecurity illustration of exposed AI applications and cloud-native workloads at risk from misconfiguration

    Exposed AI Apps Turn Misconfiguration Into RCE Risk

    2 days ago
  • Professional cybersecurity illustration of defenders prioritizing Microsoft Patch Tuesday vulnerabilities across servers and identity systems.

    May 2026 Patch Tuesday: How SMBs Should Prioritize 132 Microsoft CVEs

    3 days ago
Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.
  • Cyber Security Blog
  • General CTI
1 hour ago

Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

CISA added Microsoft Exchange Server CVE-2026-42897 to KEV after evidence of active exploitation. For SMBs and government contractors, the lesson is simple: internet-facing email infrastructure needs emergency mitigation playbooks before the patch lands.

Editorial cybersecurity illustration of device code phishing and OAuth token theft.
  • Cyber Security Blog
  • General CTI
6 hours ago

Device Code Phishing Turns Legitimate Login Flows Into Token Theft

Device code phishing is scaling because it abuses legitimate OAuth flows instead of simply stealing passwords. Here is what SMBs and government contractors should review now.

Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.
  • Cyber Security Blog
  • General CTI
11 hours ago

Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

Recent Linux kernel exploit discussions show why SMBs and government contractors should reduce unused modules and services, not just wait for patches.

Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity
  • Cyber Security Blog
  • General CTI
1 day ago

PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

FortiGuard Labs reports PureLogs is being delivered through PawsRunner steganography. Here is what SMBs and government contractors should watch for defensively.

Google Blocks Massive Model Extraction Campaign Targeting Gemini AI with 100,000+ Malicious Prompts
  • Chinese Cyber Threat Intelligence

Google Blocks Massive Model Extraction Campaign Targeting Gemini AI with 100,000+ Malicious Prompts

The Updated APT Playbook: Tales from the Kimsuky threat actor group
  • North Korean Cyber Threat Intelligence

The Updated APT Playbook: Tales from the Kimsuky threat actor group

DeepLoad Malware: AI-Generated Evasion Meets ClickFix Delivery in Enterprise Credential Theft Campaign
  • AI (General)
  • Malware

DeepLoad Malware: AI-Generated Evasion Meets ClickFix Delivery in Enterprise Credential Theft Campaign

BoryptGrab Stealer Spreads Through 100+ Malicious GitHub Repositories
  • Malware

BoryptGrab Stealer Spreads Through 100+ Malicious GitHub Repositories

Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

acint1 hour ago04 mins

CISA added Microsoft Exchange Server CVE-2026-42897 to KEV after evidence of active exploitation. For SMBs and government contractors, the lesson is simple: internet-facing email infrastructure needs emergency mitigation playbooks before the patch lands.

Read More
Editorial cybersecurity illustration of device code phishing and OAuth token theft.
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

Device Code Phishing Turns Legitimate Login Flows Into Token Theft

acint6 hours ago03 mins

Device code phishing is scaling because it abuses legitimate OAuth flows instead of simply stealing passwords. Here is what SMBs and government contractors should review now.

Read More
Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.
  • Cyber Security Blog
  • General CTI

Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

acint11 hours ago04 mins

Recent Linux kernel exploit discussions show why SMBs and government contractors should reduce unused modules and services, not just wait for patches.

Read More
Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity
  • Cyber Security Blog
  • General CTI
  • Malware

PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

acint1 day ago03 mins

FortiGuard Labs reports PureLogs is being delivered through PawsRunner steganography. Here is what SMBs and government contractors should watch for defensively.

Read More
Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis
  • Cyber Security Blog
  • General CTI
  • Privacy & Security

BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

acint1 day ago04 mins

GTIG reports UNC6671 / BlackFile is using vishing, AiTM phishing, and SaaS data theft to extort organizations. Here is what SMBs and government contractors should harden now.

Read More
Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.
  • Cyber Security Blog
  • General CTI
  • Malware

Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

acint1 day ago04 mins

Unit 42 reports Gremlin Stealer has evolved with resource-file obfuscation, session hijacking, Discord token theft, and crypto clipboard fraud. Here is what SMBs and government contractors should do defensively.

Read More
Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.
  • Cyber Security Blog
  • General CTI

Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

acint2 days ago04 mins

Cisco Talos reports active exploitation of Catalyst SD-WAN authentication bypass and related vulnerabilities. Here is what SMBs and government contractors should prioritize now.

Read More
Editorial cybersecurity illustration of a modular Russian espionage botnet architecture with covert command-and-control paths.
  • Cyber Security Blog
  • General CTI
  • Malware
  • Russian Cyber Threat Intelligence

Kazuar Shows Russian Espionage Malware Is Engineering for Resilience

acint2 days ago04 mins

Microsoft reports that Kazuar, attributed to Russian state actor Secret Blizzard, has evolved into a modular P2P botnet. Here is what SMBs and government contractors should take from it defensively.

Read More
Editorial cybersecurity illustration of exposed AI applications and cloud-native workloads at risk from misconfiguration
  • AI (General)
  • Cyber Security Blog
  • General CTI

Exposed AI Apps Turn Misconfiguration Into RCE Risk

acint2 days ago04 mins

Microsoft warns that publicly exposed AI apps, MCP servers, and Kubernetes-hosted agent tooling can turn weak defaults into practical paths for RCE, credential theft, and data exposure.

Read More
Professional cybersecurity illustration of defenders prioritizing Microsoft Patch Tuesday vulnerabilities across servers and identity systems.
  • Cyber Security Blog
  • General CTI

May 2026 Patch Tuesday: How SMBs Should Prioritize 132 Microsoft CVEs

acint3 days ago04 mins

Microsoft’s May 2026 Patch Tuesday shipped 132 CVEs. Here is how SMBs and government contractors should prioritize identity, server, and Office risks first.

Read More
  • 1
  • 2
  • 3
  • …
  • 29

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

b3acb61d4b

You May Have Missed

  • Russian Cyber Threat Intelligence

APT28 Deploys Operation MacroMaze: Webhook-Based Macro Malware Targets European Entities

acint 3 months ago
  • North Korean Cyber Threat Intelligence

The Updated APT Playbook: Tales from the Kimsuky threat actor group

bulwarkblack 2 years ago2 years ago
  • Offensive Devices / Tactics
  • Projects

PWNAGOTCHI: DEEP REINFORCEMENT LEARNING FOR WIFI PWNING!

bulwarkblack 2 years ago2 years ago
  • General CTI

IDMerit Exposes One Billion Personal Records in Massive KYC Database Leak

acint 3 months ago
Virtual machine infrastructure being abused by ransomware operators
  • General CTI

Ransomware Gangs Abuse ISPsystem VMmanager to Hide Malicious Infrastructure at Scale

acint 3 months ago
  • Operational Technology (OT)

Iconics Suite SCADA Vulnerability Enables Denial-of-Service Through Privileged File Operations

acint 4 months ago4 months ago
  • General CTI

BreachForums Breach Exposes 324,000 Cybercriminal Identities in Unprecedented Dark Web Leak

acint 3 months ago
  • Business
  • Makes you Think

Hormuz Crisis Investment Report

bulwarkblack 3 weeks ago3 weeks ago
2026 Powered By BlazeThemes.