Skip to content
Saturday, May 23, 2026
  • Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk
  • Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling
  • F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths
  • Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
  • Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk
  • Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling
  • F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths
  • Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface
Register / Sign Up
RSS
Bulwark Black LLC

Bulwark Black LLC

Cyber Security | Software Development | Consulting Services

  • Cyber Threat Intelligence
    • Russian Cyber Threat Intelligence
      • Russian Actors and Alias’s 09JAN2024
    • Chinese Cyber Threat Intelligence
      • Chinese Actors and Alias’s
    • North Korean Cyber Threat Intelligence
      • North Korean Actors and Alias’s
    • Iranian Cyber Threat Intelligence
      • Iranian Actors and Alias’s
    • Malware
      • Top 200 Malware of January 2024
    • Global Cyber Threat Intelligence
      • Global Threat Actors
  • Defensive Security
    • Detection
  • Offensive Security
    • Bug Bounty
    • Offensive Devices / Tactics
    • Red Teaming
  • AI (Artificial Intelligence)
    • AI (General)
  • Privacy & Security
    • Becoming Self Sufficient
    • Digital Assets
    • Makes you Think
    • Social Engineering
  • Research Papers
  • Training / Projects
    • Projects
    • Training
  • Blog
    • Cyber Security Blog
  • Contact
  • About
  • Donations
  • Products
    • VA Disability Calc & Track App
  • Services
  • Operational Technology (OT)
Recent
  • Editorial cybersecurity illustration of Void Dokkaebi InvisibleFerret developer endpoint malware risk

    Void Dokkaebi’s InvisibleFerret Shift Shows Developer Endpoints Are Production Risk

    6 hours ago
  • Editorial cybersecurity illustration of Iranian Nimbus Manticore APT tooling, fake installers, SEO poisoning, and backdoor command-and-control.

    Nimbus Manticore Shows Iranian APTs Are Moving Faster With AI-Assisted Tooling

    20 hours ago
  • Editorial cybersecurity illustration of an edge appliance compromise pivoting into Linux, Confluence, and identity systems

    F5-to-Confluence Intrusion Shows Edge Devices Are Identity Attack Paths

    1 day ago
  • Editorial cybersecurity illustration of Iranian APT Screening Serpens recruitment-lure espionage and RAT command-and-control.

    Screening Serpens Shows Recruiting Is Now an Espionage Attack Surface

    1 day ago
  • Editorial cybersecurity illustration of an IoT DDoS botnet being contained by defenders and law enforcement signal lines.

    Kimwolf Arrest Shows DDoS Risk Starts on Forgotten IoT

    2 days ago
  • Editorial cybersecurity illustration of trojanized productivity apps hiding malware command-and-control infrastructure.

    TamperedChef Shows Signed Productivity Apps Cannot Be Trusted by Default

    2 days ago
  • Editorial cybersecurity illustration of AI-assisted influence operations, credential theft, and crypto fraud infrastructure.

    Patriot Bait Shows AI-Enabled Fraud Can Turn Trust Into Attack Surface

    2 days ago
  • Editorial cybersecurity illustration of npm supply-chain malware targeting CI/CD secrets and cloud credentials

    Mini Shai-Hulud Shows CI/CD Secrets Are the Real npm Supply-Chain Prize

    3 days ago
  • Abstract cybersecurity illustration of malicious image metadata being processed in a defended macOS workflow

    ExifTool CVE-2026-3102 Shows Image Metadata Belongs in the Threat Model

    3 days ago
  • Editorial cybersecurity illustration of P2Pinfect botnet activity across Kubernetes and Redis cloud workloads

    P2Pinfect Shows Exposed Redis in Kubernetes Can Become Dormant Botnet Infrastructure

    3 days ago
  • Chinese Cyber Threat Intelligence

Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks

bulwarkblack2 years ago01 mins
Read More
  • Malware

Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer

bulwarkblack2 years ago2 years ago01 mins

https://unit42.paloaltonetworks.com/malware-configuration-extraction-techniques-guloader-redline-stealer/

Read More
  • Malware

Hackers target Apache RocketMQ servers vulnerable to RCE attacks

bulwarkblack2 years ago2 years ago01 mins

https://www.bleepingcomputer.com/news/security/hackers-target-apache-rocketmq-servers-vulnerable-to-rce-attacks/

Read More
  • North Korean Cyber Threat Intelligence

North Korea Debuts ‘SpectralBlur’ Malware Amid macOS Onslaught

bulwarkblack2 years ago2 years ago01 mins

https://www.darkreading.com/threat-intelligence/north-korea-debuts-spectralblur-malware-amid-macos-onslaught

Read More
  • Iranian Cyber Threat Intelligence

Iran’s APT33 targets US defense contractors with novel malware

bulwarkblack2 years ago2 years ago01 mins

https://www.scmagazine.com/news/iranian-threat-group-apt33-targets-us-defense-contractors-with-novel-malware

Read More
  • Global Cyber Threat Intelligence

100 Days of YARA – 2023

bulwarkblack2 years ago2 years ago01 mins

https://bitsofbinary.github.io/yara/2023/01/01/100daysofyara.html

Read More
  • Chinese Cyber Threat Intelligence

Hide and Seek in Windows’ Closet: Unmasking the WinSxS Hijacking Hideout

bulwarkblack2 years ago2 years ago01 mins

https://www.securityjoes.com/post/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout

Read More
  • Russian Cyber Threat Intelligence

Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

bulwarkblack2 years ago2 years ago01 mins
Read More
  • 1
  • …
  • 29
  • 30
  • 31

File Search

2
ThumbNameSizeDate
Thumb IOCs_YARA_TTPs_Posted_Articles/ IOCs_YARA_TTPs_Posted_Articles

IOCs_YARA_TTPs_Posted_Articles

Open 99.71 KB 2024-01-12 January 12, 2024 2024-03-22 March 22, 2024
21 Items
99.71 KB
March 22, 2024

0

2089a0bd08

2026 Powered By BlazeThemes.