Skip to content
Wednesday, May 13, 2026
  • JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification
  • Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here
  • MCP Server Command Injection Shows Why AI Tools Need Real Isolation
  • Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification
  • Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here
  • MCP Server Command Injection Shows Why AI Tools Need Real Isolation
  • Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Cybersecurity illustration of a trusted software download site being abused to deliver poisoned installers in a supply chain attack.

    JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification

    4 days ago
  • Editorial cybersecurity illustration of a fake AI model repository hiding an infostealer attack chain.

    Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here

    4 days ago
  • Abstract cybersecurity illustration of AI agent tool calls crossing into shell command execution and defensive containment controls.

    MCP Server Command Injection Shows Why AI Tools Need Real Isolation

    5 days ago
  • Editorial cybersecurity illustration of Dirty Frag Linux privilege escalation affecting server and container environments

    Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now

    5 days ago
  • Editorial cybersecurity illustration of AI agent tool calls becoming shell commands and execution risk.

    Prompt Injection Just Became an RCE Problem for AI Agents

    5 days ago
  • Satellite over Earth with glowing geospatial data streams representing NASA Prithvi AI in orbit

    NASA Put a Geospatial AI Foundation Model in Orbit — That Should Make You Think

    5 days ago
  • Editorial cybersecurity illustration of an exposed edge firewall under stealthy network attack

    PAN-OS Captive Portal Zero-Day Shows Why Internet-Facing Edge Devices Need Immediate Review

    6 days ago
  • Dark editorial illustration of a cloud worm stealing credentials from containerized cloud infrastructure

    PCPJack Shows Cloud Malware Is Moving From Cryptomining to Credential Theft

    6 days ago
  • North Korean Cyber Threat Intelligence

North Korean Konni APT Deploys AI-Generated Malware to Target Blockchain Developers

acint3 months ago3 months ago02 mins

The North Korean threat group Konni has launched a new campaign using AI-generated PowerShell malware to target blockchain developers across the APAC region, marking a significant shift toward technical targets and cryptocurrency infrastructure.

Read More
  • General CTI

Microsoft to Disable 30-Year-Old NTLM Authentication Protocol by Default

acint3 months ago3 months ago02 mins

Microsoft announces NTLM will be disabled by default in upcoming Windows releases, marking the end of the 30-year-old authentication protocol that has been a persistent security vulnerability.

Read More
  • Operational Technology (OT)

CVE-2026-24061: 11-Year-Old GNU Telnetd Vulnerability Grants Instant Root Access

acint3 months ago03 mins

CVE-2026-24061 is a critical 11-year-old vulnerability in GNU InetUtils telnetd that allows unauthenticated attackers to gain instant root shell access. With a CVSS score of 9.8 and active exploitation confirmed, this flaw affects over 200,000 devices running Telnet servers globally, including embedded systems, IoT devices, and OT infrastructure.

Read More
Mobile device security concept with digital vulnerabilities
  • General CTI

Ivanti Patches Two Critical EPMM Zero-Day Vulnerabilities Under Active Exploitation

acint3 months ago02 mins

Two critical CVSS 9.8 vulnerabilities in Ivanti Endpoint Manager Mobile (CVE-2026-1281, CVE-2026-1340) are under active exploitation, allowing unauthenticated remote code execution. CISA has added them to the KEV catalog with a February 1 federal deadline.

Read More
  • General CTI

Ivanti EPMM Zero-Days Actively Exploited: Pre-Auth RCE via Bash Arithmetic Expansion

acint3 months ago3 months ago02 mins

Two actively exploited pre-auth RCE vulnerabilities (CVE-2026-1281 and CVE-2026-1340) in Ivanti Endpoint Manager Mobile allow attackers to execute arbitrary commands via Bash arithmetic expansion. CISA has added these to the KEV catalog.

Read More
  • Malware

Android Malware Campaign Abuses Hugging Face AI Platform to Distribute RAT

acint3 months ago3 months ago02 mins

Threat actors are abusing the Hugging Face AI platform to host Android malware, using server-side polymorphism to generate thousands of RAT variants every 15 minutes.

Read More
  • General CTI

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

acint3 months ago02 mins

SmarterTools patches critical CVE-2026-24423 (CVSS 9.3) unauthenticated RCE vulnerability in SmarterMail email server. Two other flaws including one under active exploitation also addressed. Update immediately.

Read More
  • Business

Aisuru Botnet Shatters Records with 31.4 Tbps DDoS Attack

acint3 months ago3 months ago02 mins

The Aisuru/Kimwolf botnet launched the largest DDoS attack ever publicly disclosed, peaking at 31.4 Tbps and 200 million requests per second in Cloudflare’s ‘Night Before Christmas’ campaign.

Read More
  • Business

Match Group Data Breach Exposes User Information from Tinder, Hinge, and OkCupid

acint3 months ago02 mins

Match Group confirms cybersecurity incident after ShinyHunters voice phishing campaign compromises SSO account, exposing data from popular dating apps including Tinder, Hinge, OkCupid, and Match.com.

Read More
  • General CTI

SolarWinds Fixes Six Critical Web Help Desk Vulnerabilities Including RCE and Auth Bypass

acint3 months ago02 mins

SolarWinds patches six severe vulnerabilities in Web Help Desk, including four critical flaws (CVSS 9.8) enabling unauthenticated remote code execution and authentication bypass. Organizations should update to WHD 2026.1 immediately.

Read More
  • 1
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 28

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

57f079932b

2026 Powered By BlazeThemes.