tj-actions/changed-files with Falco Actions
A vulnerability (CVE-2025-30066) was identified in the GitHub Action tj-actions/changed-files, affecting numerous repositories. This article discusses how Falco Actions can be integrated into CI/CD workflows to detect and respond to attacks like this one, providing enhanced visibility and security against potential threats. Affected: GitHub Actions, CI/CD environments, software repositories

Keypoints :

A vulnerability (CVE-2025-30066) was discovered in tj-actions/changed-files on March 14, 2025.…
Read More
Shuckworm Targets Foreign Military Mission Based in Ukraine
Shuckworm, a Russia-linked espionage group, continues to target Ukraine, focusing on military missions of Western countries. Utilizing an updated GammaSteel tool, the group has shifted from VBS scripts to PowerShell-based methods and employs various ransom exfiltration techniques, including leveraging legitimate web services. The campaign demonstrates increased sophistication in data exfiltration methods and obfuscation strategies.…
Read More
CYBERDEFENDERS, — ICEID LAB
This article details a challenge based on the IceID banking Trojan, focusing on skills required for blue team analysts, including network traffic analysis, memory forensics, and reverse engineering. By utilizing tools such as VirusTotal and the MITRE ATT&CK framework, the challenge addresses sophisticated cyber threats and fosters expertise in identifying indicators of compromise.…
Read More
Hunt.io Insights: Gamaredon’s Flux-Like Infrastructure and a Look at Recent ShadowPad Activity
This article explores the infrastructure patterns of two state-linked cyber threat groups based in Russia and China, focusing on Gamaredon and RedFoxtrot. It highlights their use of fast flux DNS techniques for operational stealth and the reuse of TLS certificates among others. Furthermore, it discusses the implications of these patterns for cybersecurity defenses.…
Read More
VibeScamming — From Prompt to Phish: Benchmarking Popular AI Agents’ Resistance to the Dark Side
This article discusses the dangers posed by generative AI in facilitating phishing scams, highlighting the results of the VibeScamming Benchmark v1.0. Guardio Labs evaluated how well popular AI platforms handle scam-related prompts, revealing significant vulnerabilities across different models. The findings urge AI developers to prioritize safety measures in their technologies to protect individuals from fraud.…
Read More
The Evolution of APT36’s Crimson RAT: Tracking Variants and Feature Expansion Over the Years
APT36, also known as The Transparent Tribe, is a cyber espionage group targeting Indian defense, government, and education sectors. They have developed various versions of the Crimson RAT, showcasing significant evolution and complexities in their functionalities and evasion techniques. Affected: India, Cybersecurity, Government, Defense, Education

Keypoints :

APT36 is linked to Pakistan and targets Indian sectors.…
Read More
Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks
The Seqrite Labs APT team has identified significant advancements in tactics utilized by the Pakistan-linked SideCopy APT group, which are now targeting a broader range of sectors, including railways, oil & gas, and external affairs in addition to previous targets in India. The group has shifted from HTA files to MSI packages for deployment, demonstrating a sophisticated evolution in their operational methodologies, including the use of multiple remote access trojans (RATs) and credential phishing techniques.…
Read More
Python & MITRE ATT&CK: Part 2/15
The discussion focuses on the Resource Development phase of a phishing attack, highlighting the suspicious characteristics of a newly created domain intended for malicious purposes. Key indicators include a short domain lifespan, use of a free email address, questionable registration details, and DNS configuration anomalies. Affected: phishing attacks, cybercrime, domain registration.…
Read More
NEPTUNE RAT : An advanced Windows RAT with System Destruction Capabilities and Password Exfiltration from 270+ Applications
The latest Neptune RAT variant poses a significant threat, utilizing PowerShell commands to deliver and execute malicious payloads via an obfuscated script. It features advanced techniques for persistence and anti-analysis, enabling it to steal credentials, perform live monitoring, and execute ransomware capabilities. The report discusses its distribution methods across platforms like GitHub and highlights the dangers it poses to users.…
Read More
Fast Flux is the New Cyber Weapon—And It’s Hard to Stop, Warns CISA
Summary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and other organizations have issued an advisory on “Fast Flux,” a technique used by cybercriminals to obscure malicious infrastructure. Fast flux involves rapidly rotating IP addresses to evade detection, posing significant challenges for cybersecurity professionals. The advisory calls for proactive measures from cybersecurity service providers to mitigate the rising threat associated with this covert tactic.…
Read More
Fast Flux Alert: National Security Agencies Warn of Evasive Tactic
Summary: A new cybersecurity advisory from various national security agencies highlights the Fast Flux technique, which allows cyber actors to conceal their operations by frequently changing DNS records. This method poses a substantial threat to both individual organizations and national security, enabling malicious actors to create resilient command and control infrastructures that are difficult to disrupt.…
Read More
CISA, FBI, nations warn of fast flux DNS threat
Summary: The US Cybersecurity Infrastructure Agency (CISA) has issued a warning to organizations and cybersecurity firms regarding the rising threat of fast flux attacks, which malicious actors use to obscure the location of their servers by frequently changing DNS records. Fast flux tactics, often involving botnets, complicate efforts to block malicious infrastructure, posing significant national security risks.…
Read More
US, Allies Warn of Threat Actors Using ‘Fast Flux’ to Hide Server Locations
Summary: Cybersecurity agencies warn that threat actors are using ‘fast flux’ techniques to obscure the location of their malicious servers, thereby enhancing the resilience of their cyber infrastructures. This approach involves rapidly changing DNS records to ensure the continuity of command-and-control communication while evading detection. The continuous use of compromised hosts complicates efforts to identify and mitigate malicious traffic effectively.…
Read More
CISA warns of Fast Flux DNS evasion used by cybercrime gangs
Summary: CISA, the FBI, and NSA are urging organizations to address the “Fast Flux” evasion technique employed by threat actors to evade detection. This DNS tactic makes tracking malicious activities difficult by rapidly changing IP addresses. The bulletin highlights detection and mitigation strategies to combat this technique used by various cybercriminals and ransomware groups.…
Read More
US, Australia, Canada warn of ‘fast flux’ scheme used by ransomware gangs
Summary: Ransomware gangs and Russian government hackers are increasingly using the “fast flux” technique to conceal the infrastructure used in cyberattacks, making it harder for law enforcement and defenders to track and block them. This method involves rapidly changing DNS records associated with a domain, complicating detection and blocking efforts.…
Read More
Response to CISA Advisory (AA25-093A): Fast Flux: A National Security Threat
This advisory from multiple cybersecurity agencies highlights the ongoing threat of fast flux techniques used by malicious actors, particularly ransomware groups like Hive and Nefilim. These methods complicate detection and disruption, necessitating improved collaboration and enhanced detection mechanisms among organizations. Affected: organizations, Internet service providers, cybersecurity service providers, financial sector, manufacturing sector, transportation sector

Keypoints :

April 3, 2025 advisory published by CISA, NSA, FBI, and other partners.…
Read More
This advisory addresses the significant threat posed by the “fast flux” technique, used by malicious cyber actors to evade detection and maintain command and control infrastructure. Fast flux enables the rapid alteration of DNS records, complicating tracking and blocking actions. The advisory calls for collaborative efforts from government entities and service providers to enhance detection and mitigation capabilities against fast flux activities.…
Read More