Skip to content
Monday, May 18, 2026
  • Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
  • AI Literacy Needs Fundamentals: Teaching Technology in the Real World
  • node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls
  • Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails
  • AI Literacy Needs Fundamentals: Teaching Technology in the Real World
  • node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls
  • Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Editorial cybersecurity illustration of a GitHub token breach leading to codebase theft and extortion risk.

    Grafana GitHub Token Breach Shows Why Source Code Access Needs Guardrails

    8 hours ago
  • Editorial illustration of AI literacy, database fundamentals, and rural cybersecurity support.

    AI Literacy Needs Fundamentals: Teaching Technology in the Real World

    11 hours ago11 hours ago
  • Editorial cybersecurity illustration of an npm supply-chain compromise leaking CI and cloud secrets through DNS signals.

    node-ipc Backdoor Shows Why CI Secrets Need Supply Chain Controls

    13 hours ago
  • Editorial cybersecurity illustration of Microsoft Exchange OWA zero-day exploitation and defensive mitigation.

    Exchange OWA Zero-Day Shows Why Email Servers Need Emergency Mitigation

    1 day ago
  • Editorial cybersecurity illustration of device code phishing and OAuth token theft.

    Device Code Phishing Turns Legitimate Login Flows Into Token Theft

    1 day ago
  • Editorial illustration of defenders reducing Linux kernel attack surface by disabling unused IPsec ESP modules.

    Recent Linux Kernel Exploits Make Attack Surface Reduction a Practical Priority

    2 days ago
  • Cyber threat intelligence illustration of steganography-based malware delivery and PureLogs infostealer activity

    PawsRunner Steganography Shows Infostealers Are Hiding in Plain Sight

    2 days ago
  • Abstract CTI illustration of vishing, cloud identity compromise, and SaaS data exfiltration for BlackFile extortion analysis

    BlackFile Vishing Campaign Shows Why MFA Alone Is Not Enough

    2 days ago
  • Professional cybersecurity illustration showing Gremlin Stealer hiding payloads inside resource files and targeting browser sessions.

    Gremlin Stealer Shows Why Browser Sessions Are Now High-Value Targets

    3 days ago
  • Editorial cybersecurity illustration of Cisco SD-WAN controllers under active exploitation through authentication bypass and webshell activity.

    Cisco SD-WAN Exploitation Shows Edge Controllers Need Emergency Review

    3 days ago
  • Chinese Cyber Threat Intelligence

Hide and Seek in Windows’ Closet: Unmasking the WinSxS Hijacking Hideout

bulwarkblack2 years ago2 years ago01 mins

https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout

Read More
  • Russian Cyber Threat Intelligence

Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

bulwarkblack2 years ago2 years ago01 mins
Read More
  • 1
  • …
  • 28
  • 29
  • 30

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

a98478cdec

2026 Powered By BlazeThemes.