Threat Report Erlang/OTP SSH Vulnerability A critical vulnerability (CVE-2025-32433) in Erlang/OTP's SSH daemon allows unauthenticated remote code execution, affecting critical infrastructure and operational technology networks. Threat Overview The threat report published by AlienVault on 2025-08-11T14:56:49.748Z highlights
Continue ReadingAuthor: essadmin
Exposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
Threat Report Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open Threat Overview The latest threat report from AlienVault, published on 2025-08-08, details a rapid exploitation of an exposed Java Debug
Continue ReadingObserved Malicious Driver Use Associated with Akira SonicWall Campaign
Threat Report Akira SonicWall Campaign A sophisticated cyber threat exploiting drivers for AV/EDR evasion Threat Overview The recent threat report published by AlienVault on August 8, 2025, highlights a significant cyber campaign involving the exploitation of
Continue ReadingProject AK47 Uncovering a Link to the SharePoint Vulnerability Attacks
Threat Report PROJECT AK47 A sophisticated threat cluster exploiting recent SharePoint vulnerabilities for financial gain. Threat Overview Project AK47 is a complex and evolving threat identified by Unit 42, which has significant overlaps with Microsoft's reported
Continue ReadingGhost in the Zip New PXA Stealer and Its Telegram Powered Ecosystem
Threat Report PURPLE HAZE AND GORE SHELL A sophisticated cyber espionage campaign leveraging new stealer malware and its Telegram-powered ecosystem. Threat Overview The Ghost in the Zip report details a complex cyber espionage operation involving the
Continue ReadingExploring Storm 2603’s Previous Ransomware Operations
Threat Report STORM 2603 A detailed analysis of previous ransomware operations by the threat actor group STORM 2603. Threat Overview Storm 2603 is a sophisticated threat actor group known for its involvement in various ransomware operations.
Continue ReadingAPT28’s New Arsenal LAMEHUG The First AI-Powered Malware
Threat Report LAMEHUG A sophisticated AI-powered malware designed for advanced persistent threats (APTs) Threat Overview LAMEHUG is an advanced AI-powered malware developed by the threat actor group APT28. This malware leverages artificial intelligence to enhance its
Continue ReadingXWorm V6 Advanced Evasion and AMSI Bypass Capabilities Revealed
Threat Report XWORM V6 New advanced evasion techniques and AMSI bypass capabilities revealed in XWorm version 6.0 Threat Overview In September 2024, Netskope Threat Labs reported on the XWorm malware and its infection chain. After nearly
Continue ReadingThe Covert Operators Playbook Infiltration of Global Telecom Networks
Threat Report The Covert Operator's Playbook: Infiltration of Global Telecom Networks A detailed analysis of the infiltration tactics used by a sophisticated actor group targeting global telecom networks. Threat Overview The Covert Operator's Playbook is a
Continue ReadingRaven Stealer Unmasked Telegram-Based Data Exfiltration
Threat Report RAVEN STEALER UNMASKED: TELEGRAM-BASED DATA EXFILTRATION A sophisticated information-stealing malware targeting Chromium-based browsers. Threat Overview Raven Stealer is a modern, lightweight information-stealing malware developed in Delphi and C++. It specifically targets Chromium-based browsers to
Continue Reading