Skip to content
Wednesday, May 13, 2026
  • JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification
  • Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here
  • MCP Server Command Injection Shows Why AI Tools Need Real Isolation
  • Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification
  • Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here
  • MCP Server Command Injection Shows Why AI Tools Need Real Isolation
  • Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Cybersecurity illustration of a trusted software download site being abused to deliver poisoned installers in a supply chain attack.

    JDownloader Site Compromise Shows Why Trusted Downloads Still Need Verification

    4 days ago
  • Editorial cybersecurity illustration of a fake AI model repository hiding an infostealer attack chain.

    Fake OpenAI Hugging Face Repo Shows AI Supply Chain Risk Is Already Here

    4 days ago
  • Abstract cybersecurity illustration of AI agent tool calls crossing into shell command execution and defensive containment controls.

    MCP Server Command Injection Shows Why AI Tools Need Real Isolation

    5 days ago
  • Editorial cybersecurity illustration of Dirty Frag Linux privilege escalation affecting server and container environments

    Dirty Frag Turns Linux Footholds Into Root: What Defenders Should Do Now

    5 days ago
  • Editorial cybersecurity illustration of AI agent tool calls becoming shell commands and execution risk.

    Prompt Injection Just Became an RCE Problem for AI Agents

    5 days ago
  • Satellite over Earth with glowing geospatial data streams representing NASA Prithvi AI in orbit

    NASA Put a Geospatial AI Foundation Model in Orbit — That Should Make You Think

    5 days ago
  • Editorial cybersecurity illustration of an exposed edge firewall under stealthy network attack

    PAN-OS Captive Portal Zero-Day Shows Why Internet-Facing Edge Devices Need Immediate Review

    6 days ago
  • Dark editorial illustration of a cloud worm stealing credentials from containerized cloud infrastructure

    PCPJack Shows Cloud Malware Is Moving From Cryptomining to Credential Theft

    6 days ago
  • Chinese Cyber Threat Intelligence

Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks

bulwarkblack2 years ago01 mins
Read More
  • Malware

Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer

bulwarkblack2 years ago2 years ago01 mins

https://unit42.paloaltonetworks.com/malware-configuration-extraction-techniques-guloader-redline-stealer/

Read More
  • Malware

Hackers target Apache RocketMQ servers vulnerable to RCE attacks

bulwarkblack2 years ago2 years ago01 mins

https://www.bleepingcomputer.com/news/security/hackers-target-apache-rocketmq-servers-vulnerable-to-rce-attacks/

Read More
  • North Korean Cyber Threat Intelligence

North Korea Debuts ‘SpectralBlur’ Malware Amid macOS Onslaught

bulwarkblack2 years ago2 years ago01 mins

https://www.darkreading.com/threat-intelligence/north-korea-debuts-spectralblur-malware-amid-macos-onslaught

Read More
  • Iranian Cyber Threat Intelligence

Iran’s APT33 targets US defense contractors with novel malware

bulwarkblack2 years ago2 years ago01 mins

https://www.scmagazine.com/news/iranian-threat-group-apt33-targets-us-defense-contractors-with-novel-malware

Read More
  • Global Cyber Threat Intelligence

100 Days of YARA – 2023

bulwarkblack2 years ago2 years ago01 mins

https://bitsofbinary.github.io/yara/2023/01/01/100daysofyara.html

Read More
  • Chinese Cyber Threat Intelligence

Hide and Seek in Windows’ Closet: Unmasking the WinSxS Hijacking Hideout

bulwarkblack2 years ago2 years ago01 mins

https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout

Read More
  • Russian Cyber Threat Intelligence

Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

bulwarkblack2 years ago2 years ago01 mins
Read More
  • 1
  • …
  • 26
  • 27
  • 28

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

57f079932b

2026 Powered By BlazeThemes.