Recorded Futureβs Insikt Group uncovered four GrayBravo activity clusters. TAG-160 impersonates logistics firms, while TAG-161 impersonates Booking.com, employing ClickFix to deliver CastleLoader and Matanbuchus. www.recordedfuture.com/research/gra...
09.12.2025 11:25
π 6
π 5
π¬ 0
π 0
"There is a lack of consensus regarding the current state of AI malware maturity."
So we put together #AIM3 to help #malware researchers describe the maturity level of an #AI_Malware Threat.
www.recordedfuture.com/blog/ai-malw...
06.12.2025 03:23
π 3
π 2
π¬ 0
π 0
We all spent the last year vibe coding the shit out of web apps in React without knowing a single thing about JavaScript. Then enters #CVE-2025-55182 #React2Shell... poetry.
βThe spirits that I summoned I now cannot rid myself of again.β
05.12.2025 12:56
π 3
π 0
π¬ 0
π 0
Great blog post from @briankrebs.infosec.exchange.ap.brid.gy on #StarkIndustries. Makes a great point by highlighting it's links to MIRHosting. Where there are Dutch prefixes under these providers, there is usually always MIRHosting upstream.
11.09.2025 18:32
π 4
π 3
π¬ 1
π 0
Not a lot of public reporting on this, but we are seeing a mountain of activity π
04.09.2025 19:36
π 3
π 3
π¬ 0
π 0
From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure
Insikt Group reveals TAG-150βs multi-tiered infrastructure and CastleRAT malwareβan advanced threat actor evolving rapidly with stealth and scale.
1/ Today @whoisnt.bsky.social, Marius, and I release a report on a new threat actor, #TAG-150, active since at least March 2025, which stands out for its rapid development, sophistication, responsiveness to reporting, and a large, evolving infrastructure: www.recordedfuture.com/research/fro...
04.09.2025 15:04
π 9
π 6
π¬ 1
π 3
Big report from our team at Recorded Future around #ThreatActivityEnablers (all of the hostings and services that power malicious infrastructure). Great Research on #StarkIndustries!
27.08.2025 17:00
π 3
π 0
π¬ 0
π 0
Please give me the strength not to buy this hotswap GPU framework laptop with maxed-out specs. π¬
27.08.2025 01:44
π 2
π 0
π¬ 0
π 0
TAG-144βs Persistent Grip on South American Organizations
Persistent cyber operations by TAG-144 (Blind Eagle) continue to target South American, primarily Colombian, government entities through advanced spearphishing and RAT-based malware campaigns. Explore...
1/ We just released a new report on TAG-144 (also known as Blind Eagle), where we identified five distinct activity clusters that have been active throughout 2024 and 2025, primarily targeting the Colombian government at multiple levels. Link to the report: www.recordedfuture.com/research/tag...
26.08.2025 14:15
π 6
π 6
π¬ 1
π 1
π A day in the life of a #Lumma malware operator... this is a must-read! πͺ
20.08.2025 14:33
π 3
π 1
π¬ 0
π 0
"By 2025, 96% of companies are expected to use public cloud services, and 84% will adopt private cloud services. Additionally, 92% of organizations are projected to implement a multicloud strategy, reflecting the growing trend of cloud adoption across various industries." - Nextwork
23.07.2025 19:23
π 0
π 0
π¬ 0
π 0
remcos |Β e24d9afbc2ed01e348ef6946672ef5f310940dd57a5216d0f1edbe31c919374b | Triage
Check this remcos report malware sample
e24d9afbc2ed01e348ef6946672ef5f310940dd57a5216d0f1edbe31c919374b, with a score of 10 out of 10.
#Remcos #malware is now at v7.0. No significant changes to the payload side, but improvements to enhance reliability and address bugs based on operator experience added.
Samples:
tria.ge/250709-3vxwa...
tria.ge/250710-vba87...
Looks to be distributed via email campaigns from reboundue[.]com emails
11.07.2025 01:34
π 0
π 0
π¬ 0
π 0
The memo acknowledges that the list includes many terms that are used by the
NSA in contexts that have nothing to do with
DEI. For example, the term "privilege" is used by the NSA in the context of "privilege escalation." In the intelligence world, privilege escalation refers to "techniques that adversaries use to gain higher-level permissions on a system or network."
Oh my god, they just unintentionally wrecked a ton of red team playbooks at the NSA popular.info/p/the-nsas-b...
10.02.2025 14:43
π 2660
π 736
π¬ 112
π 143
a man in a suit and tie with the words it 's just refreshing behind him
ALT: a man in a suit and tie with the words it 's just refreshing behind him
Today was the first day I reflexively went to Bsky for a quick check-in on the world of social media. Post-Twitter, as someone who does not use other platforms, I missed seeing authentic commentary without all the other madness.
02.02.2025 18:41
π 0
π 0
π¬ 0
π 0
Trae - Ship Faster with Trae
Trae is an adaptive AI IDE that transforms how you work, collaborating with you to run faster.
Threat model around controlling an AI-driven IDE like Cursor and now Trae (Bytedance) www.trae.ai
Imagine being a MiTM of code generation and shipment to git repos. You could lean the developer toward vulnerabilities and Just-in-time code injection for PRs.
We will still be busy, that's for sure.
23.01.2025 16:50
π 0
π 0
π¬ 0
π 0
Lumma Stealer Q&A
The people have spoken, you asked and them replied
When top Infostealers do the press rounds π¬... it's a good reminder for me.
Cybercrime isnβt lurking in the shadows anymoreβitβs running PR campaigns.
The game has changed so much and is probably driving the disruption ops that LE has been doing. π€
g0njxa.medium.com/lumma-steale...
16.01.2025 21:47
π 0
π 0
π¬ 0
π 0
RE: Comment - Why don't technical people want to go into leadership? In other industries, technical leaders are common. The top cybersecurity firms were started by practitioners who helped define the industry. What changed? I would argue that the gap is on the leadership side.
09.12.2024 18:47
π 0
π 0
π¬ 0
π 0
However, anyone who has mentored knows many people are looking to get into or get promoted in #cybersecurity. The people (and talent) are there, but there needs to be more/better leadership talent to guide those newcomers into roles we genuinely need.
09.12.2024 18:47
π 1
π 0
π¬ 1
π 0