Threat Report PHANTOM CARD A new Android Trojan targeting banking customers in Brazil with potential for global expansion. Threat Overview PhantomCard is a newly identified Android Trojan that specifically targets banking customers in Brazil. This malware
Continue ReadingBlog
Coordinated Brute Force Campaign Targets Fortinet SSL VPN
Threat Report COORDINATED BRUTE FORCE CAMPAIGN TARGETS FORTINET SSL VPN A coordinated brute force campaign targeting Fortinet SSL VPNs was observed on August 3, with over 780 unique IPs triggering the Fortinet SSL VPN Bruteforcer tag.
Continue ReadingMalvertising campaign leads to PS1Bot a multi-stage malware framework
Threat Report PS1Bot Malware Framework A sophisticated multi-stage malware implemented in PowerShell and C# Threat Overview A new threat report published by AlienVault on August 12, 2025, highlights a malvertising campaign distributing PS1Bot, an advanced multi-stage
Continue ReadingFrom ClickFix to Command A Full PowerShell Attack Chain
Threat Report From ClickFix to Command: A Full PowerShell Attack Chain A targeted intrusion campaign impacting Israeli organizations has been identified, leveraging compromised internal email infrastructure to distribute phishing messages. Threat Overview The threat report published
Continue ReadingKeys to the Kingdom Erlang OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
Threat Report Erlang/OTP SSH Vulnerability A critical vulnerability (CVE-2025-32433) in Erlang/OTP's SSH daemon allows unauthenticated remote code execution, affecting critical infrastructure and operational technology networks. Threat Overview The threat report published by AlienVault on 2025-08-11T14:56:49.748Z highlights
Continue ReadingExposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
Threat Report Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open Threat Overview The latest threat report from AlienVault, published on 2025-08-08, details a rapid exploitation of an exposed Java Debug
Continue ReadingObserved Malicious Driver Use Associated with Akira SonicWall Campaign
Threat Report Akira SonicWall Campaign A sophisticated cyber threat exploiting drivers for AV/EDR evasion Threat Overview The recent threat report published by AlienVault on August 8, 2025, highlights a significant cyber campaign involving the exploitation of
Continue ReadingProject AK47 Uncovering a Link to the SharePoint Vulnerability Attacks
Threat Report PROJECT AK47 A sophisticated threat cluster exploiting recent SharePoint vulnerabilities for financial gain. Threat Overview Project AK47 is a complex and evolving threat identified by Unit 42, which has significant overlaps with Microsoft's reported
Continue ReadingGhost in the Zip New PXA Stealer and Its Telegram Powered Ecosystem
Threat Report PURPLE HAZE AND GORE SHELL A sophisticated cyber espionage campaign leveraging new stealer malware and its Telegram-powered ecosystem. Threat Overview The Ghost in the Zip report details a complex cyber espionage operation involving the
Continue ReadingExploring Storm 2603’s Previous Ransomware Operations
Threat Report STORM 2603 A detailed analysis of previous ransomware operations by the threat actor group STORM 2603. Threat Overview Storm 2603 is a sophisticated threat actor group known for its involvement in various ransomware operations.
Continue Reading