Yurei Ransomware Encryption Analysis Go Builder Insights AlienVault released a detailed threat report on November 14 2025 that examines the encryption architecture of the Yurei ransomware family. The analysis focuses on the Go based builder that
Continue ReadingMonth: November 2025
Contagious Interview Actors Use JSON Storage for Malware Delivery
Threat Overview The latest threat report from NVISO Labs reveals a significant evolution in the Contagious Interview malware campaign. The attackers, known as the Contagious Interview Actors, have shifted their delivery vector to leverage JSON storage
Continue ReadingFantasy Hub Russian RAT Malware Service
Fantasy Hub Russian RAT Malware Service In a recent publication dated 2025‑11‑10, the threat intelligence community was alerted to a new Android Remote Access Trojan (RAT) known as Fantasy Hub. The malware is being offered as
Continue ReadingBookingcom Phishing Attack Targets Hotels and Guests
Introduction The hospitality sector has long been a lucrative target for cybercriminals due to the wealth of personal and financial data it holds. On 2025-11-07, AlienVault released a detailed threat report titled "Booking.com Phishing Campaign Targeting
Continue ReadingMalicious Infrastructure Gains Stability Through aurologic GmbH
Threat Overview The latest analysis from AlienVault, published on 2025-11-06, highlights a critical shift in the cyber threat landscape: the German hosting provider aurologic GmbH has evolved into a central hub for high-risk hosting networks. This
Continue ReadingHidden HyperV Virtual Machines Enable Evasion Persistence
On November 5, 2025, AlienVault released a new threat report titled Evasion and Persistence via Hidden Hyper‑V Virtual Machines that sheds light on the sophisticated tactics employed by the Curly COMrades threat actor. The investigation reveals
Continue ReadingRemote Access Real Cargo Cybercriminals Target Trucking Logistics
Threat Overview In the rapidly evolving landscape of cybercrime, a new and sophisticated threat vector has emerged that specifically targets the trucking and logistics sector. According to a recent AlienVault threat report published on 2025‑11‑03, cybercriminals
Continue ReadingLarge Scale Cloud Abuse Threat
Threat Overview On 2025-11-01, AlienVault published a detailed threat report titled "Cloud Abuse at Scale". The report highlights a sophisticated attack infrastructure named TruffleNet that leverages the open-source tool TruffleHog to systematically test compromised credentials and
Continue Reading