Dark Web Profile: Flax Typhoon
Flax Typhoon, a Chinese state-sponsored APT group, has shown a significant evolution in its cyber espionage activities since mid-2021, primarily targeting Taiwanese entities while expanding globally to North America, Africa, and Southeast Asia. The group’s strategic focus aligns with Chinese government objectives, utilizing sophisticated techniques to maintain prolonged access to compromised networks.…
Read More
Cookie-Bite attack PoC uses Chrome extension to steal session tokens
Summary: The “Cookie-Bite” attack leverages a malicious Chrome extension to steal session cookies from Azure Entra ID, allowing attackers to bypass multi-factor authentication (MFA) and gain unauthorized access to cloud services such as Microsoft 365. Although the tactic of stealing session cookies has been seen before, the attack’s stealth and persistence make it particularly concerning.…
Read More
GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
Summary: Cybersecurity researchers revealed a patched vulnerability in Google Cloud Platform’s Cloud Composer that could allow attackers to escalate privileges and access sensitive services. Known as ConfusedComposer, this flaw permitted users to exploit custom Python packages to gain unauthorized access across GCP. Similar vulnerabilities in other cloud services highlight the broader implications of inherited security issues within interconnected cloud systems.…
Read More
Hack The Box – Analysis Windows HARD
This article provides a comprehensive walkthrough of exploiting an Active Directory setup through various techniques, including LDAP injection, Kerberos enumeration, and privilege escalation using Metasploit. The detailed steps guide readers from initial enumeration to gaining shell access and extracting flags. Affected: Active Directory, Web Applications, Windows Systems

Keypoints :

Active Directory box analysis on Hack The Box focused on various web exploits and privilege escalation techniques.…
Read More
Cybersecurity & Generative AI – Part 3 – Opportunities, Agents, Challenges
This article explores the applications of Generative AI in cybersecurity, highlighting its potential for enhancing threat detection, incident response, malware analysis, and more. It examines the concept of Agentic AI, which employs large language models (LLMs) to autonomously tackle complex cybersecurity tasks. Despite these advancements, the article addresses significant challenges in implementing Generative AI solutions, such as data quality, hallucinations, and integration complexities.…
Read More
The Reality of Mobile Endpoint Security in 2025
Mobile devices are becoming increasingly exploited entry points for cyber attacks in enterprises, prompting a shift in attack strategies from traditional methods to mobile vectors. As organizations adopt Bring Your Own Device (BYOD) policies, the need for effective Mobile Threat Defense (MTD) solutions becomes crucial. The rapid rise of sophisticated mobile attacks necessitates a reevaluation of security measures to address the vulnerabilities associated with mobile endpoints.…
Read More
AgeoStealer: How Social Engineering Targets Gamers
Infostealers, including the newly identified AgeoStealer, have become a significant threat, responsible for a large portion of credential theft and data breaches. AgeoStealer employs unique tactics, leveraging gaming platforms for distribution and evading detection through advanced obfuscation techniques. Its ability to extract sensitive information highlights the urgent need for organizations to bolster their defenses against these types of cyber threats.…
Read More
Chinese Ghost Hackers Hit Hospitals And Factories In America And U.K.
Summary: A new threat intelligence report reveals that financially motivated Chinese cybercriminals, known as Ghost, are targeting organizations globally, particularly in North America and the U.K., with ransomware attacks. These attackers exploit unpatched vulnerabilities to gain access, install backdoors, exfiltrate sensitive data, and deploy ransomware. The FBI and Cybersecurity and Infrastructure Security Agency have issued warnings regarding the persistent danger posed by Ghost hackers across more than 70 countries.…
Read More
In our analysis of FOG ransomware, we discovered nine samples uploaded to VirusTotal, linked to the Department of Government Efficiency (DOGE). These ransomware samples were distributed via email, showcasing the ongoing threat posed by FOG ransomware. The investigation revealed various attack vectors and the involvement of multiple sectors, highlighting the need for proactive cybersecurity measures.…
Read More
Red teaming simulates real-world cyberattacks to evaluate organizational defenses, utilizing several tools such as Cobalt Strike, Caldera, and Infection Monkey. These tools are linked to the MITRE ATT&CK framework, enhancing their effectiveness in identifying vulnerabilities and testing defense mechanisms. Affected: organizations, IT security sector, cybersecurity environment

Keypoints :

Red teaming involves simulating cyberattacks to test defenses.…
Read More
The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT
Dark Caracal’s latest cyber operation uses Poco RAT, a sophisticated malware targeting Spanish-speaking regions in Latin America, primarily through phishing campaigns. The group employs clever methods to deliver malicious payloads, including trojanized attachments and cloud storage services. Affected: corporate networks, Spanish-speaking users, Latin America

Keypoints :

Dark Caracal has launched a new campaign using the Poco RAT malware.…
Read More
The Weekly Threat Round-up 14/04/2025 – 18/04/2025
This week’s cyber news highlights the enhanced capabilities of the Tycoon2FA phishing kit, Pakistani-linked SideCopy’s expanded targets in India, the use of open-source tools by UNC5174, the funding crisis for MITRE’s CVE program, and a new malware campaign from the Russian group Midnight Blizzard. These developments underscore the continuous evolution of cyber threats and their implications across various sectors.…
Read More
Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
Summary: A complex multi-stage attack has been seen delivering malware such as Agent Tesla variants and Remcos RAT using a deceptive email tactic. The attack employs various methods for payload delivery and execution, including PowerShell scripts and encoded files, further complicating detection efforts. Concurrently, a new version of MysterySnail RAT is being utilized by a Chinese-speaking threat actor named IronHusky to target government organizations in Mongolia and Russia.…
Read More
In Other News: 4chan Hacked, Android Auto-Reboot, Nemesis Admin Charged
Summary: SecurityWeek’s roundup highlights significant cybersecurity developments, including vulnerabilities in an enterprise printer solution, the impact of cyber breaches on stock prices, and NATO’s cyber exercise. The report also mentions the record number of Microsoft product vulnerabilities, a hack on 4chan, and a new auto-reboot feature for Android.…
Read More