Threat Overview In late December 2025, security researchers uncovered a sophisticated supply‑chain attack that leveraged the Visual Studio Code ecosystem to deliver a multi‑stage malware payload. The attack was initiated through a seemingly innocuous extension named
Continue ReadingBlog
DNS Reveals SSO Attack Infrastructure
In a recent intelligence briefing released on December 3, 2025, the security community was alerted to a sophisticated campaign that leverages the open‑source Evilginx 3.0 framework to compromise single sign‑on (SSO) services across higher‑education institutions in
Continue ReadingArkanix Stealer New Profit Malware
Arkanix Stealer: New Profit Malware In the rapidly evolving landscape of cybercrime, a new threat has emerged that underscores the ease with which attackers can launch profitable operations. The Arkanix Stealer, first reported by AlienVault on
Continue ReadingAI LLMs Dual Use Dilemma
Threat Overview Large language models (LLMs) have become a double‑edge sword in the cyber‑security arena. While they enable unprecedented automation, creativity, and efficiency, they also lower the barrier for malicious actors to design, prototype, and deploy
Continue ReadingHoliday Fake Stores Exploit Black Friday Sales
In the latest intelligence update released by AlienVault on 27 November 2025, security researchers uncovered a sprawling network of more than 2,000 counterfeit e‑commerce sites that have been engineered to prey on consumers during the peak
Continue ReadingNTLM Abuse in 2025 Cyberattacks
NTLM Abuse in 2025 Cyberattacks: Threat Overview In late 2025, a comprehensive threat report was released by AlienVault detailing the continued exploitation of the NTLM authentication protocol in Windows environments. Despite being a legacy protocol, NTLM
Continue ReadingWater APT Multi Stage Attack Uncovered
Executive Summary On 26 November 2025, AlienVault released a comprehensive threat report titled "Water APT Multi-Stage Attack Uncovered". The report dissects a sophisticated, multi-stage intrusion campaign attributed to the Water Gamayun APT group. The campaign demonstrates
Continue ReadingOracle Identity Manager Authentication Bypass Vulnerability Report
Executive Summary On 2025-11-25, security researcher PetrP.73 released a detailed threat report on CVE-2025-61757, a critical vulnerability affecting Oracle Identity Manager (OIM) versions 12.2.1.4.0 and 14.1.2.1.0. The flaw, rated CVSS 9.8, enables remote code execution by
Continue ReadingTamperedChef Signed Apps Deliver Stealthy Payloads
Threat Overview On November 20, 2025, security firm Sand‑Storm released a detailed threat report titled Cooking up Trouble: How TamperedChef Uses Signed Apps to Deliver Stealthy Payloads. The report, authored by Acronis, documents a global cyber‑espionage
Continue ReadingOctober 2025 Phishing Email Trends Report ASEC
Executive Summary In October 2025, the Association of Threat Prevention (ATIP) and its sister company, the Security Research Institute (SSI), released a comprehensive report titled “October 2025 Trends Report on Phishing Emails – ASEC.” The study
Continue Reading