The Containment Era is here. →Explore

Showing 12 / 3308 threat reports
Impact (HIGH)
Vidar Infostealer 2026 Breach: A Wake-Up Call for Enhanced Security Measures
In early 2026, the Vidar infostealer malware emerged as a dominant threat in the cybercriminal ecosystem, exploiting the void left by the takedowns of Lumma and Rhadamanthys. Vidar's operators released significant upgrades and expanded distribution channels, leading to widespread infections across various sectors. The malware targets sensitive data, including credentials, cookies, and cryptocurrency wallets, facilitating unauthorized access and potential financial losses. Organizations such as Pickett & Associates, Deloitte, KPMG, and Samsung were among those compromised due to inadequate multi-factor authentication (MFA) enforcement, resulting in the exfiltration of substantial volumes of sensitive data. ([techradar.com](https://www.techradar.com/pro/security/dozens-of-organizations-fall-victim-to-infostealers-after-failing-to-enforce-mfa?utm_source=openai)) This incident underscores the critical importance of implementing robust security measures, particularly MFA, to protect against credential theft. The rapid evolution and distribution of infostealer malware like Vidar highlight the need for continuous vigilance and proactive defense strategies to mitigate emerging cyber threats.

4 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (LOW)
Ransomware Rivalry: 0APT and KryBit Expose Each Other's Operations
In April 2026, a rare conflict erupted between two emerging ransomware-as-a-service (RaaS) groups, 0APT and KryBit. 0APT, initially known for fabricating victim claims, targeted rival ransomware operators, including KryBit, by leaking their operational data. This exposure revealed KryBit's infrastructure, personnel details, and victim negotiations. In retaliation, KryBit breached 0APT's systems, exposing fabricated victim lists and defacing 0APT's leak site. This mutual exposure has significantly disrupted both groups' operations, necessitating infrastructure rebuilding and rebranding efforts. This incident underscores the volatile nature of cybercriminal alliances and the potential for internal conflicts to disrupt malicious operations. For defenders, such feuds provide valuable insights into ransomware tactics, techniques, and procedures, enhancing preparedness against future attacks.

4 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Lotus Wiper Attack Disrupts Venezuelan Energy Sector in 2025
In December 2025, Venezuela's state-owned oil company, Petróleos de Venezuela S.A. (PDVSA), experienced a significant cyberattack that disrupted its core administrative and operational systems. The attack, attributed to a previously unknown malware dubbed 'Lotus Wiper,' employed sophisticated living-off-the-land techniques to disable system defenses and systematically delete critical data, rendering systems unrecoverable. This incident led to the temporary suspension of oil cargo deliveries and forced PDVSA to rely on manual processes, highlighting vulnerabilities in the company's technological infrastructure. ([darkreading.com](https://www.darkreading.com/cyber-risk/lotus-wiper-attack-targeted-venezuelan-energy-firms-utilities?utm_source=openai)) The Lotus Wiper attack underscores the escalating use of destructive malware targeting critical infrastructure, particularly in the energy sector. The incident serves as a stark reminder of the need for robust cybersecurity measures and incident response strategies to protect against sophisticated cyber threats that can have severe operational and economic consequences.

4 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
BlueNoroff's AI-Driven Fake Zoom Attacks on Crypto Executives
In April 2026, the North Korean state-sponsored hacking group BlueNoroff launched a sophisticated campaign targeting cryptocurrency executives. The attackers impersonated trusted contacts to schedule fake Zoom meetings, utilizing AI-generated avatars and stolen video footage to create convincing virtual environments. During these meetings, victims were prompted to install malicious software under the guise of resolving technical issues, leading to the installation of malware designed for credential theft, persistent access, and cryptocurrency wallet exfiltration. This campaign underscores the evolving threat landscape where attackers leverage advanced social engineering techniques and AI to enhance the credibility of their schemes. Organizations, especially in the cryptocurrency sector, must remain vigilant against such deceptive tactics and implement robust security measures to protect against these sophisticated attacks.

4 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (CRITICAL)
Vect 2.0 Ransomware: A Flawed Threat Acting as a Data Wiper
In April 2026, the Vect 2.0 ransomware variant was discovered to contain a critical design flaw that causes it to function as a data wiper rather than traditional ransomware. This flaw affects versions targeting Windows, Linux, and VMware ESXi systems. Specifically, for files larger than 128KB, the malware generates four encryption nonces but only retains the final one, rendering the first three-quarters of each large file permanently unrecoverable. Consequently, victims who pay the ransom cannot retrieve their critical data, as the necessary decryption information is irreversibly lost. ([darkreading.com](https://www.darkreading.com/threat-intelligence/vect-ransomware-wiper-design-error?utm_source=openai)) This incident underscores the evolving nature of cyber threats, where even ransomware can inadvertently become more destructive due to coding errors. Organizations must prioritize robust backup strategies and comprehensive security measures to mitigate such risks. The Vect 2.0 case also highlights the importance of thorough threat analysis and the potential unintended consequences of malware development flaws.

4 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (MEDIUM)
NSA GRASSMARLIN CVE-2026-6807 XXE Vulnerability: A Wake-Up Call for ICS Security
In April 2026, a vulnerability identified as CVE-2026-6807 was disclosed in NSA's GRASSMARLIN v3.2.1, a tool used for mapping industrial control system (ICS) networks. The flaw involves improper handling of XML input, allowing attackers to exploit XML External Entity (XXE) references to access sensitive information. This vulnerability has a CVSS v3 base score of 5.5, indicating medium severity. Notably, GRASSMARLIN reached end-of-life status in 2017, and no patches or updates are planned to address this issue. The disclosure of this vulnerability underscores the risks associated with using unsupported software in critical infrastructure environments. Organizations relying on GRASSMARLIN should assess their exposure and consider transitioning to actively maintained alternatives to mitigate potential security threats.

5 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Critical cPanel Authentication Vulnerability: Immediate Action Required
In April 2026, cPanel identified a critical authentication vulnerability affecting all supported versions of its software, potentially allowing unauthorized access to control panel interfaces. The issue was addressed with patches released on April 28, 2026, for versions 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.136.0.5, and 11.134.0.20. Organizations were urged to update their systems promptly to mitigate the risk of exploitation. ([thehackernews.com](https://thehackernews.com/2026/04/critical-cpanel-authentication.html?utm_source=openai)) This incident underscores the importance of timely patch management and proactive security measures, as attackers were reportedly exploiting the vulnerability before the patch was available. ([cyberkendra.com](https://www.cyberkendra.com/2026/04/cpanel-authentication-bypass-was.html?utm_source=openai))

5 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
CISA Adds Two Critical Vulnerabilities to Known Exploited Vulnerabilities Catalog
On April 28, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog: CVE-2024-1708, a path traversal vulnerability in ConnectWise ScreenConnect versions 23.9.7 and prior, and CVE-2026-32202, a Windows Shell protection mechanism failure. CVE-2024-1708 allows attackers to execute remote code or access sensitive data by exploiting improper path handling, while CVE-2026-32202 enables attackers to steal NTLMv2 hashes without user interaction, leading to potential unauthorized access. ([sentinelone.com](https://www.sentinelone.com/vulnerability-database/cve-2024-1708/?utm_source=openai)) The inclusion of these vulnerabilities in the KEV Catalog underscores the ongoing threat posed by actively exploited security flaws. Organizations are urged to prioritize patching these vulnerabilities to mitigate risks associated with remote code execution and unauthorized data access, which can lead to significant operational disruptions and data breaches.

5 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
DPRK-Linked Supply Chain Attack on Axios npm Package in 2026
In March 2026, North Korean state-sponsored hackers, identified as UNC1069, executed a sophisticated supply chain attack by compromising the widely-used JavaScript library Axios. The attackers gained access to the maintainer's npm account and published malicious versions 1.14.1 and 0.30.4, which included a remote access trojan (RAT). This malware granted the attackers control over infected systems, potentially leading to credential theft and persistent access. The malicious versions were available for approximately three hours before detection and removal, during which time they were downloaded millions of times, posing a significant risk to developers and organizations worldwide. This incident underscores the escalating threat of supply chain attacks targeting open-source ecosystems. The rapid deployment and widespread use of compromised packages highlight the need for enhanced security measures in software development pipelines. Organizations must implement stringent monitoring and verification processes to safeguard against such vulnerabilities.

5 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Understanding and Mitigating AI-Driven Cyberattacks
In February 2026, cybersecurity researchers identified a significant evolution in attack methodologies: threat actors are now leveraging custom AI systems to automate and expedite the cyber kill chain. This advancement enables attackers to autonomously map Active Directory structures and obtain Domain Admin credentials within minutes, drastically reducing the time required for system compromise. The integration of AI into cyberattacks has rendered traditional defensive workflows insufficient, as these automated systems can adapt and execute complex attacks with unprecedented speed and precision. This development underscores a critical shift in the cybersecurity landscape, where AI-enhanced attacks are no longer theoretical but a present reality. Organizations must recognize the urgency of adapting their security strategies to counteract these sophisticated threats. The rapid adoption of AI by malicious actors necessitates a reevaluation of existing defenses to ensure they are capable of mitigating the risks posed by autonomous cyberattacks.

5 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (HIGH)
Claude Mythos AI Enhances Firefox Security with 271 Vulnerability Fixes
In April 2026, Mozilla collaborated with Anthropic to utilize the advanced AI model, Claude Mythos, for a comprehensive security audit of Firefox. This partnership led to the identification and remediation of 271 vulnerabilities in Firefox 150, marking a significant advancement in AI-assisted cybersecurity. The vulnerabilities ranged from minor issues to critical flaws, all of which were addressed in the latest release. This initiative underscores the potential of AI in enhancing software security by rapidly detecting and mitigating vulnerabilities that might elude traditional methods. The success of this collaboration highlights a pivotal shift in cybersecurity, where defenders can leverage AI to gain a decisive advantage over potential threats. As AI tools become more sophisticated, their integration into security protocols is expected to become standard practice, offering a proactive approach to threat detection and resolution.

6 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I
Impact (NONE)
Inside an OPSEC Playbook: How Threat Actors Evade Detection
In April 2026, cybersecurity researchers uncovered a detailed operational security (OPSEC) playbook authored by a threat actor specializing in high-volume carding operations. This playbook outlines a three-tier infrastructure model designed to evade detection: a public layer utilizing clean devices and rotating residential IPs, an operational layer with encrypted containers and dedicated infrastructure, and an extraction layer focused on isolated, air-gapped systems for monetization. The document also highlights common OPSEC failures, such as identity reuse and inadequate digital fingerprinting countermeasures, and recommends advanced techniques like time-delayed triggers and behavioral randomization to enhance operational resilience. ([bleepingcomputer.com](https://www.bleepingcomputer.com/news/security/inside-an-opsec-playbook-how-threat-actors-evade-detection/amp/?utm_source=openai)) This revelation underscores a significant shift in cybercriminal strategies towards more structured and methodical approaches to maintain long-term operational security. For defenders, understanding these sophisticated OPSEC frameworks is crucial to developing more effective detection and mitigation strategies against evolving cyber threats.

21 hours ago

Kill Chain at a Glance
IC
PE
LM
C&C
E
I