Skip to content
Saturday, May 23, 2026
  • Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk
  • Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling
  • F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths
  • Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk
  • Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling
  • F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths
  • Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Editorial cybersecurity illustration of Void Dokkaebi InvisibleFerret developer endpoint malware risk

    Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk

    23 minutes ago
  • Editorial cybersecurity illustration of Iranian Nimbus Manticore APT tooling, fake installers, SEO poisoning, and backdoor command-and-control.

    Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling

    14 hours ago
  • Editorial cybersecurity illustration of an edge appliance compromise pivoting into Linux, Confluence, and identity systems

    F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths

    19 hours ago
  • Editorial cybersecurity illustration of Iranian APT Screening Serpens recruitment-lure espionage and RAT command-and-control.

    Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface

    1 day ago
  • Editorial cybersecurity illustration of an IoT DDoS botnet being contained by defenders and law enforcement signal lines.

    Kimwolf Arrest Shows DDoS Risk Starts on Forgotten IoT

    2 days ago
  • Editorial cybersecurity illustration of trojanized productivity apps hiding malware command-and-control infrastructure.

    TamperedChef Shows Signed Productivity Apps Cannot Be Trusted by Default

    2 days ago
  • Editorial cybersecurity illustration of AI-assisted influence operations, credential theft, and crypto fraud infrastructure.

    Patriot Bait Shows AI-Enabled Fraud Can Turn Trust Into Attack Surface

    2 days ago
  • Editorial cybersecurity illustration of npm supply-chain malware targeting CI/CD secrets and cloud credentials

    Mini Shai-Hulud Shows CI/CD Secrets Are the Real npm Supply-Chain Prize

    3 days ago
  • Abstract cybersecurity illustration of malicious image metadata being processed in a defended macOS workflow

    ExifTool CVE-2026-3102 Shows Image Metadata Belongs in the Threat Model

    3 days ago
  • Editorial cybersecurity illustration of P2Pinfect botnet activity across Kubernetes and Redis cloud workloads

    P2Pinfect Shows Exposed Redis in Kubernetes Can Become Dormant Botnet Infrastructure

    3 days ago
Editorial cybersecurity illustration of Void Dokkaebi InvisibleFerret developer endpoint malware risk
  • Cyber Security Blog
  • Malware
23 minutes ago

Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk

Trend Micro reports North Korea-aligned Void Dokkaebi has moved InvisibleFerret into Cython-compiled Python extension modules. For SMBs and government contractors, the real risk is developer endpoint access to CI/CD, cloud, and production secrets.

Editorial cybersecurity illustration of Iranian Nimbus Manticore APT tooling, fake installers, SEO poisoning, and backdoor command-and-control.
  • Cyber Security Blog
  • General CTI
14 hours ago

Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling

Check Point Research reports that IRGC-affiliated Nimbus Manticore resurfaced with fake Zoom and SQL Developer lures, SEO poisoning, AppDomain hijacking, and a new MiniFast backdoor. Here is what SMBs and government contractors should tighten first.

Editorial cybersecurity illustration of an edge appliance compromise pivoting into Linux, Confluence, and identity systems
  • Cyber Security Blog
  • General CTI
19 hours ago

F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths

Microsoft analyzed an intrusion where an F5 BIG-IP edge appliance led to Linux access, Confluence compromise, credential theft, and identity relay attempts. Here is what SMBs and government contractors should tighten first.

Editorial cybersecurity illustration of Iranian APT Screening Serpens recruitment-lure espionage and RAT command-and-control.
  • Cyber Security Blog
  • General CTI
1 day ago

Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface

Iran-nexus Screening Serpens used recruitment and meeting lures, new RAT variants, and .NET AppDomainManager hijacking. Here is what SMBs and government contractors should tighten now.

CVE-2026-2441: Google Patches First Actively Exploited Chrome Zero-Day of 2026

    CVE-2026-2441: Google Patches First Actively Exploited Chrome Zero-Day of 2026

    LiteLLM Supply Chain Attack: TeamPCP Deploys Multi-Stage Credential Stealer to 95M Monthly Downloads
    • AI (General)
    • Malware

    LiteLLM Supply Chain Attack: TeamPCP Deploys Multi-Stage Credential Stealer to 95M Monthly Downloads

    SANDWORMMODE: Self-Replicating npm Worm Steals Dev Secrets and Targets AI Coding Tools
    • Malware

    SANDWORMMODE: Self-Replicating npm Worm Steals Dev Secrets and Targets AI Coding Tools

    Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
    • Cyber Security Blog
    • General CTI

    Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

    Editorial cybersecurity illustration of Void Dokkaebi InvisibleFerret developer endpoint malware risk
    • Cyber Security Blog
    • Malware
    • North Korean Cyber Threat Intelligence

    Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk

    acint23 minutes ago03 mins

    Trend Micro reports North Korea-aligned Void Dokkaebi has moved InvisibleFerret into Cython-compiled Python extension modules. For SMBs and government contractors, the real risk is developer endpoint access to CI/CD, cloud, and production secrets.

    Read More
    Editorial cybersecurity illustration of Iranian Nimbus Manticore APT tooling, fake installers, SEO poisoning, and backdoor command-and-control.
    • Cyber Security Blog
    • General CTI
    • Iranian Cyber Threat Intelligence
    • Malware

    Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling

    acint14 hours ago04 mins

    Check Point Research reports that IRGC-affiliated Nimbus Manticore resurfaced with fake Zoom and SQL Developer lures, SEO poisoning, AppDomain hijacking, and a new MiniFast backdoor. Here is what SMBs and government contractors should tighten first.

    Read More
    Editorial cybersecurity illustration of an edge appliance compromise pivoting into Linux, Confluence, and identity systems
    • Cyber Security Blog
    • General CTI
    • Privacy & Security

    F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths

    acint19 hours ago05 mins

    Microsoft analyzed an intrusion where an F5 BIG-IP edge appliance led to Linux access, Confluence compromise, credential theft, and identity relay attempts. Here is what SMBs and government contractors should tighten first.

    Read More
    Editorial cybersecurity illustration of Iranian APT Screening Serpens recruitment-lure espionage and RAT command-and-control.
    • Cyber Security Blog
    • General CTI
    • Iranian Cyber Threat Intelligence
    • Privacy & Security

    Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface

    acint1 day ago04 mins

    Iran-nexus Screening Serpens used recruitment and meeting lures, new RAT variants, and .NET AppDomainManager hijacking. Here is what SMBs and government contractors should tighten now.

    Read More
    Editorial cybersecurity illustration of an IoT DDoS botnet being contained by defenders and law enforcement signal lines.
    • Cyber Security Blog
    • General CTI
    • Malware

    Kimwolf Arrest Shows DDoS Risk Starts on Forgotten IoT

    acint2 days ago03 mins

    The alleged Kimwolf botmaster arrest is a useful reminder for SMBs and government contractors: DDoS resilience starts with asset visibility, upstream protection, and hardening forgotten IoT and edge devices.

    Read More
    Editorial cybersecurity illustration of trojanized productivity apps hiding malware command-and-control infrastructure.
    • Cyber Security Blog
    • General CTI
    • Malware
    • Privacy & Security

    TamperedChef Shows Signed Productivity Apps Cannot Be Trusted by Default

    acint2 days ago04 mins

    TamperedChef-style malware hides inside convincing signed productivity apps. Here is what SMBs and government contractors should do about it.

    Read More
    Editorial cybersecurity illustration of AI-assisted influence operations, credential theft, and crypto fraud infrastructure.
    • AI (General)
    • Cyber Security Blog
    • General CTI
    • Privacy & Security

    Patriot Bait Shows AI-Enabled Fraud Can Turn Trust Into Attack Surface

    acint2 days ago04 mins

    Trend Micro’s Patriot Bait research shows how one operator used AI assistance, social trust, WordPress credential attacks, and crypto fraud infrastructure to scale a low-cost cybercrime operation.

    Read More
    Editorial cybersecurity illustration of npm supply-chain malware targeting CI/CD secrets and cloud credentials
    • Cyber Security Blog
    • General CTI
    • Malware
    • Privacy & Security

    Mini Shai-Hulud Shows CI/CD Secrets Are the Real npm Supply-Chain Prize

    acint3 days ago04 mins

    Mini Shai-Hulud’s @antv npm compromise shows why dependency malware should be treated as a CI/CD credential-theft threat, not just a package hygiene problem.

    Read More
    Abstract cybersecurity illustration of malicious image metadata being processed in a defended macOS workflow
    • Cyber Security Blog
    • General CTI
    • Privacy & Security

    ExifTool CVE-2026-3102 Shows Image Metadata Belongs in the Threat Model

    acint3 days ago03 mins

    CVE-2026-3102 in ExifTool shows why image metadata processing should be patched, isolated, and monitored like any other untrusted file-ingest path.

    Read More
    Editorial cybersecurity illustration of P2Pinfect botnet activity across Kubernetes and Redis cloud workloads
    • Cyber Security Blog
    • General CTI
    • Malware

    P2Pinfect Shows Exposed Redis in Kubernetes Can Become Dormant Botnet Infrastructure

    acint3 days ago04 mins

    Fortinet observed P2Pinfect infections inside GKE clusters where exposed Redis instances became long-lived botnet footholds. For SMBs and government contractors, the lesson is clear: cloud misconfiguration, runtime visibility, and egress monitoring matter as much as patching.

    Read More
    • 1
    • 2
    • 3
    • …
    • 31

    File Search

    2
    ThumbNameSizeDate
    Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

    IOCs_YARA_TTPs_Posted_Articles

    Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
    21 Items
    99.71 KB
    March 22, 2024

    0

    2089a0bd08

    You May Have Missed

    ClawHavoc supply chain attack compromises ClawHub AI marketplace with malicious skills
    • Malware

    ClawHavoc Supply Chain Attack Poisons OpenClaw ClawHub With 1,184 Malicious AI Agent Skills

    acint 3 months ago

      Starkiller: New Commercial-Grade Phishing Kit Bypasses MFA with Live Site Proxying

      acint 3 months ago
      Editorial cybersecurity illustration of AI agent tool calls becoming shell commands and execution risk.
      • AI (General)
      • Cyber Security Blog

      Prompt Injection Just Became an RCE Problem for AI Agents

      acint 2 weeks ago
      • Global Cyber Threat Intelligence
      • Russian Cyber Threat Intelligence

      Backdoor.Win32 Carbanak (Anunak) / Named Pipe Null DACL

      bulwarkblack 2 years ago
      • Iranian Cyber Threat Intelligence

      Seedworm APT Targets US Banks and Airports with New Dindoor and Fakeset Backdoors

      acint 3 months ago
      • Cyber Security Blog
      • Detection

      Detecting and Responding to Security Incidents and Why its Difficult.

      Albert LaScola 2 years ago2 years ago
      • Chinese Cyber Threat Intelligence

      Chinese APT Exploited Dell RecoverPoint Zero-Day for 18 Months Before Discovery

      acint 3 months ago
      • General CTI

      ManoMano Data Breach Exposes 37.8 Million Customer Records via Zendesk Third-Party Compromise

      acint 3 months ago
      2026 Powered By BlazeThemes.