Skip to content
  • Tue. Mar 31st, 2026
TIR
  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe
Top Tags
  • Incident_Response
  • Threat_Hunting
  • Vulnerability Management
  • Malware_Detection
  • Cybercrime_Organizations
  • Ransomware
  • Nation_State_Actors

Latest Post

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
  • Latest
  • Popular
  • Trending
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
Articles
OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
Articles
Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
Industry_News
Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
Articles
Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

EDITOR'S CHOICE

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
Industry_News

Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools

12 March 2026 Threat Analyst
Articles

BadPaw and MeowMeow: steganographic .NET malware hits Ukrainian targets

12 March 2026 Threat Analyst
Articles

UAT-9244 hits South American telcos with TernDoor, PeerTime and BruteEntry

6 March 2026 Threat Analyst
Articles

BadAudio and APT24: “good enough” OPSEC powering a multi-vector espionage chain

2 March 2026 Threat Analyst
Articles

Iran crisis cyber risk rises as defacements and disruptive activity reported

2 March 2026 Threat Analyst
Articles

OpenClaw “ClawJacked” chain: malicious websites can hijack local AI agents via localhost WebSockets

2 March 2026 Threat Analyst
Vulnerabilities_Exploits

Critical Juniper PTX Junos OS Evolved flaw enables unauthenticated root takeover (CVE-2026-21902)

26 February 2026 Threat Analyst

Incorrect permission assignment exposes an internal anomaly-detection service, enabling remote root code execution on affected PTX routers. PTX • Junos OS Evolved • Router takeover • RCE Metadata Executive Summary…

Articles

APT37 “Ruby Jumper” campaign bridges air-gapped networks using USB and a portable Ruby runtime

26 February 2026 Threat Analyst

Zscaler ThreatLabz reports a December 2025 campaign it tracks as Ruby Jumper, attributed with high confidence to APT37 (aka ScarCruft, Ruby Sleet, Velvet Chollima). The infection chain begins with a…

Articles

Cyber Threats to the UK Financial System: Banking, Capital Markets, Asset Management and Central Banking (Transatlantic & Geopolitical Drivers, 2024–2026 Incident Case Studies)

26 February 2026 Threat Analyst

Executive Summary UK financial stability and customer outcomes are increasingly shaped by operational cyber risk: attacks (and disruptive technology failures) that impair critical services, amplify fraud losses, and propagate quickly…

Articles Techniques_Tactics_Procedures

WebDAV Delivery via Windows File Explorer: How .URL and .LNK Shortcuts Stage Malware Outside the Browser

25 February 2026 Threat Analyst

Short title: Deep dive on Explorer-native WebDAV abuse for malware deliveryWebDAV, Windows File Explorer, WebClient, TryCloudflare, Cloudflare Tunnel, phishing, .URL, .LNK, search-ms, Mark-of-the-Web, SmartScreen, RAT delivery, detection engineering Executive Summary…

Vulnerabilities_Exploits

Active exploitation of Cisco Catalyst SD-WAN via UAT-8616 (CVE-2026-20127)

25 February 2026 Threat Analyst

Active exploitation of Cisco Catalyst SD-WAN authentication bypass (CVE-2026-20127)cisco catalyst sd-wan, vsmart, vmanage, CVE-2026-20127, UAT-8616, authentication bypass, rogue peer, NETCONF, VPN512, SD-WAN threat hunting 1. Executive Summary Cisco Talos reports…

Articles

DPRK fake interview lures and recruitment-driven access operations summary

25 February 2026 Threat Analyst

DPRK fake interview lures and recruitment-driven malware deliverydprk, contagious interview, deceptiveDevelopment, beavertail, invisibleferret, fake recruiters, coding challenges, it worker scheme, wagemole, famous chollima, laptop farms, software supply chain 1. Executive…

Articles

Abyss Locker Ransomware – Updated Profile

25 February 2026 Threat Analyst

We originally wanted to cover this locker in 2023 but were unable to acquire samples from the community. This profile reflects the currently available information as a resource as an…

Vulnerabilities_Exploits

SolarWinds Serv-U: Privileged RCE flaws patched in 15.5.4

24 February 2026 Threat Analyst

1. Executive Summary On 24 February 2026, SolarWinds released Serv-U 15.5.4 to remediate four critical (CVSS 9.1) vulnerabilities that can enable remote code execution as root/administrator in Serv-U environments where…

Articles

SANDWORM_MODE: npm supply-chain worm poisons CI workflows and AI coding assistants

24 February 2026 Threat Analyst

Short title: SANDWORM_MODE npm worm (CI secret theft + MCP poisoning)npm supply chain attack, SANDWORM_MODE, typosquatting, GitHub Actions compromise, CI secret exfiltration, MCP server injection, AI coding assistant poisoning, Shai-Hulud,…

Vulnerabilities_Exploits

Chinese APT-linked exploitation of TeamT5 ThreatSonar (CVE-2024-7694)

24 February 2026 Threat Analyst

Targeted 2024 intrusions against high-profile TeamT5 customers, later surfaced via CISA KEV listing. 1. Executive Summary CVE-2024-7694 is a high-severity arbitrary file upload vulnerability in TeamT5’s ThreatSonar Anti-Ransomware that can…

Posts pagination

1 2 3 4 … 29
Search
Recent Posts
  • OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target
  • Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials
  • Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry
  • Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes
  • Microsoft incident responders publish a playbook for detecting prompt abuse in enterprise AI tools
Archives
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • November 2023
  • October 2023
  • August 2023
  • July 2023
  • June 2023
  • January 2023
  • July 2022
  • July 2021
  • July 2020
  • June 2020
  • May 2020
Contact Info
Tweet us @ThreatIntRep

You missed

Articles

OpenClaw lures fuel ClickFix infostealer infections as agentic AI ecosystems become a new credential target

12 March 2026 Threat Analyst
Articles

Storm-2561 pushes fake VPN installers via SEO poisoning to steal enterprise credentials

12 March 2026 Threat Analyst
Industry_News

Hudson Rock ties Polyfill.io supply-chain compromise to DPRK operator via Lumma Stealer telemetry

12 March 2026 Threat Analyst
Articles

Stryker ‘Handala’ incident: global Microsoft environment disruption and reported remote device wipes

12 March 2026 Threat Analyst
TIR

TIR

© Copyright 2026 ThreatIntelReport.com

  • Home
  • Blog
  • Intelligence Reliability
  • Learning CTI Skills
  • Privacy Policy / TOS
  • Subscribe