Threat Intelligence

The latest vulnerabilities, exploits, and threat actor activity — curated by the Lost Edges Security research team.

50 items · sorted by date

Severity: Critical High Medium Low
High
Malware

Qilin EDR killer infection chain

This blog post provides an in-depth technical analysis of the malicious dynamic-link library (DLL) "msimg32.dll", which Cisco Talos observed being deployed in Qilin ransomware attacks. This DLL represents the initial stage of a sophisticated, multi-stage infection chain designed

malware ransomware
Cisco Talos Intelligence
High
Malware

New Akira Lookalike Ransomware Campaign Targeting Windows Users in South America

A new and dangerous ransomware campaign has surfaced across South America, targeting Windows users with a carefully crafted strain that closely imitates the well-known Akira ransomware. While the two may appear nearly identical on the surface, this new threat is built on an entir

malware ransomware windows
Cyber Security News
High
Malware

Researchers Observe Sub-One-Hour Ransomware Attacks

Security researchers have warned of another step change in the velocity of ransomware, after spotting the Akira group complete all stages of an attack within an hour. Halcyon said in a new report that Akira usually achieves initial access by exploiting vulnerabilities in internet

malware ransomware vpn
Infosecurity Magazine
High
Research

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime

Fraud operations have expanded beyond traditional hacking techniques to include methods that exploit legitimate services and real-world infrastructure. By combining publicly available data, weak identity verification processes, and operational gaps, threat actors are building sca

research phishing malware
Bleeping Computer
Informational
Research

New Rowhammer attacks give complete control of machines running Nvidia GPUs

The cost of high-performance GPUs, typically $8,000 or more, means they are frequently shared among dozens of users in cloud environments. Two new attacks demonstrate how a malicious user can gain full root control of a host machine by performing novel Rowhammer attacks on high-p

research cloud
Ars Technica Security
Informational
Infrastructure

UK manufacturers under cyber fire with 80% reporting attacks

Nearly 80 percent of British manufacturers say they've been hit by a cyber incident in the past year, as new research suggests disruption on the factory floor is no longer an exception but business as usual. According to security outfit ESET, 78 percent of UK manufacturers admit

infrastructure
The Register Security
High
Malware

Malicious Script That Gets Rid of ADS

Today, most malware are called "fileless" because they try to reduce their footprint on the infected computer filesystem to the bare minimum. But they need to write something... think about persistence. They can use the registry as an alternative storage location. However, some s

malware windows
SANS Internet Storm Center
High
Malware

Stranger Strings - Yurei Ransomware Operator Toolkit Exposed

Active since September 2025, Yurei is a double extortion ransomware campaign. The operators run their own Tor data leak site with a low number of victims listed at the time of writing. It is reportedly derived from Prince Ransomware, an open-source ransomware family written in Go

malware ransomware
Team Cymru Threat Research
High
Malware

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

A multi-pronged phishing campaign is targeting Spanish-speaking users in organizations across Latin America and Europe to deliver Windows banking trojans like Casbaneiro (aka Metamorfo) via another malware called Horabot. The activity has been attributed to a Brazilian cybercrime

phishing malware windows energy
The Hacker News
High
Malware

axios Compromised on npm - Malicious Versions Drop Remote Access Trojan

A hijacked maintainer account was used to publish poisoned axios releases including 1.14.1 and 0.30.4. axios is the most popular JavaScript HTTP client library with over 100 million weekly downloads. On March 30, 2026, StepSecurity identified two malicious versions of the widely

malware
Stepsecurity
High
Research

Application Control Bypass for Data Exfiltration

In case of a cyber incident, most organizations fear more of data loss (via exfiltration) than regular data encryption because they have a good backup policy in place. If exfiltration happened, it means a total loss of control of the stolen data with all the consequences (PII, CC

research data-exfiltration policy
SANS Internet Storm Center
Critical
Vulnerability

GIGABYTE Control Center vulnerable to arbitrary file write flaw

The GIGABYTE Control Center is vulnerable to an arbitrary file-write flaw that could allow a remote, unauthenticated attacker to access files on vulnerable hosts. The hardware maker says that successful exploitation could potentially lead to code execution on the underlying syste

vulnerability privilege-escalation windows energy
Bleeping Computer
Critical
Vulnerability CVE-2026-1579

PX4 Autopilot

Successful exploitation of this vulnerability could allow an attacker with access to the MAVLink interface to execute arbitrary shell commands without cryptographic authentication. The following versions of PX4 Autopilot are affected: Autopilot v1.16.0_SITL_latest_stable (CVE-202

vulnerability iot
ICS-CERT Advisories
Medium
Vulnerability

Anritsu Remote Spectrum Monitor

Successful exploitation of this vulnerability could allow attackers with network access to alter operational settings, obtain sensitive signal data, or disrupt device availability. The affected Critical Infrastructure Sectors include Communications, Defense Industrial Base, Emerg

vulnerability iot
ICS-CERT Advisories
Low
Policy

The best way to protect your phone from a warrantless search in 2026

US authorities are getting more aggressive about detentions and seizures, and no single law governs phone inspections, making devices configured for biometric unlocking highly vulnerable. Legal experts agreed that legal rights in this area were murky at best, and ZDNET's recommen

policy law-enforcement
ZDNet Security
High
Malware

New RoadK1ll WebSocket implant used to pivot on breached networks

A newly identified malicious implant named RoadK1ll is enabling threat actors to quietly move from a compromised host to other systems on the network. The malware is a Node.js implant that communicates over a custom WebSocket protocol to sustain ongoing attacker access and enable

malware
Bleeping Computer
Informational
Research

TSUBAME Report Overflow (Jul-Sep 2025)

This TSUBAME Report Overflow series discusses monitoring trends observed by overseas TSUBAME sensors, as well as other activities that are not included in the Internet Threat Monitoring Quarterly Reports. This article covers the monitoring results from July to September 2025.

research
JPCERT Blog
Informational
Vulnerability

15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow

A 15-year-old flaw in strongSwan's EAP-TTLS plugin could let hackers knock VPNs offline. Research from Bishop Fox reveals how a simple math error leads to massive memory corruption and service collapse. For over a decade and a half, a quiet but serious security flaw has been sitt

vulnerability
HACKREAD
Critical
Vulnerability

LangChain path traversal bug adds to input validation woes in AI pipelines

Security researchers are warning that applications using AI frameworks without proper safeguards can expose sensitive information in basic, yet critical, non-AI ways. According to a recent Cyera analysis, widely used AI orchestration tools, LangChain and LangGraph, are vulnerable

vulnerability
CSO Online
Critical
Vulnerability

Mass PolyShell attack wave hits 369 stores in one hour

Sansec is tracking a mass exploitation wave of the PolyShell vulnerability that hit hundreds of online stores within a single hour today. The attacks are ongoing: new victims appear every minute. Sansec Shield has been blocking PolyShell attacks since March 16th. After gaining ac

vulnerability
Sansec
Medium
Vulnerability

File read flaw in Smart Slider plugin impacts 500K WordPress sites

A vulnerability in the Smart Slider 3 WordPress plugin, active on more than 800,000 websites, can be exploited to allow subscriber-level users access to arbitrary files on the server. An authenticated attacker could use it to access sensitive files, such as wp-config.php, which i

vulnerability
Bleeping Computer
Informational
Tips

Cybersecurity Monitoring Is The Foundation Of Incident Response

When people hear the word “cyberattack,” many imagine the most extreme scenario: everything was working, and suddenly the website goes down, payments stop, files become inaccessible, and a ransom demand appears on the screen. In practice, however, most incidents develop different

tips
Grey Journal
Informational
Breach

ShinyHunters claims the hack of the European Commission

The European Commission has allegedly been breached by ShinyHunters, with reported data dumps including content from mail servers and internal communications systems. The cybercrime group added the Commission to its Tor data leak site, claiming the theft of over 350 GB+ of data.

breach
Security Affairs
Medium
APT

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian state-sponsored threat

apt phishing nation-state
The Hacker News
Medium
Malware

Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs

macOS users are targeted in a fresh ClickFix campaign that uses a Cloudflare-themed verification page to deliver a Python-based information stealer, Malwarebytes reports. The attack starts with a fake CAPTCHA page that serves a legitimate-looking Cloudflare human verification pag

malware windows
Security Week
Critical
Vulnerability

TeamPCP Targets Telnyx Package in Latest PyPI Software Supply Chain Attack

TeamPCP has again expanded its supply chain attacks on open-source repositories by targeting Telnyx, according to security researchers. The cyber threat group recently rose to notoriety by uploading malicious packages to Python Package Index (PyPI), the official online reposito

vulnerability supply-chain malware credential-theft github-actions
Infosecurity Magazine
High
AI

Masters of Imitation - How Hackers and Art Forgers Perfect the Art of Deception

Cyberattackers, equipped with AI, are mastering the art of imitating the familiar, posing as trusted users and masking their activity within legitimate processes and ordinary network traffic. Mimicry is the new normal, with 81% of attacks now malware-free. Agentic AI is helping a

ai malware
The Hacker News
High
APT

BPFdoor in Telecom Networks - Sleeper Cells in the backbone

A months-long investigation by Rapid7 Labs has uncovered evidence of an advanced China-nexus threat actor, Red Menshen, placing some of the stealthiest digital sleeper cells the team has ever seen in telecommunications networks. The goal of these campaigns is to carry out high-le

apt telecom
Rapid7 Blog
High
Mobile

These warning signs could mean spyware is on your phone - and 9 ways to keep it secure

Spyware is one of the biggest threats to your mobile security and can severely impact your phone's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phish

mobile phishing malware energy
ZDNet Security
Medium
Vulnerability

TP-Link, Canva, HikVision vulnerabilities

Cisco Talos' Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco's third-party

vulnerability policy
Cisco Talos Intelligence
High
AI

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

In September 2025, Anthropic disclosed that a state-sponsored threat actor used an AI coding agent to execute an autonomous cyber espionage campaign against 30 global targets. The AI handled 80-90% of tactical operations on its own, performing reconnaissance, writing exploit code

nation-state ai
The Hacker News
Informational
Law Enforcement

Russia arrests alleged owner of cybercrime forum LeakBase, report says

On Wednesday, Russian police arrested the alleged administrator of the cybercrime forum LeakBase, according to the state-owned news agency TASS. LeakBase was, as the U.S. Department of Justice put it, "one of the world's largest online forums for cybercriminals" for sharing hacki

law-enforcement
Techcrunch
High
Malware

Kamasers Analysis - A Multi-Vector DDoS Botnet Targeting Organizations Worldwide

Kamasers is a sophisticated DDoS botnet that supports both application-layer and transport-layer attacks, including HTTP, TLS, UDP, TCP, and GraphQL-based flooding. The malware can also act as a loader, downloading and executing additional payloads, which raises the risk of furth

ransomware malware
Any Run Blog
Low
Policy

JPCERT/CC Eyes - CSIRTs Around the World - Azerbaijan

In early March, we traveled to Baku, the capital of Azerbaijan, and had the opportunity to visit five organizations, including CSIRTs and facilities involved in cyber security workforce development. In Azerbaijan, CSIRTs have been established across various sectors, including gov

policy
JP Cert Blog
Informational
Policy

FCC targets foreign router imports amid rising cybersecurity concerns

The U.S. FCC announced a ban on importing new foreign-made consumer routers, citing unacceptable cyber and national security risks. The decision, backed by Executive Branch assessments, means such devices can no longer be sold or marketed in the U.S. unless they receive special a

policy
Security Affairs
Informational
Research

Inside Cyber Council, the toughest RSAC ticket to get

In Northern California wine country the weekend before RSAC, roughly 80 top cybersecurity CEOs, chief information security officers and former government officials convene at the intimate Cyber Council gathering to game out the next two to three years for the industry. For the fi

research
Axios
Critical
Vulnerability

PolyShell attacks target 56% of all vulnerable Magento stores

Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores. According to eCommerce security company Sansec, hackers started exploiting the critical PolyShell

vulnerability rce
Bleeping Computer
Critical
Vulnerability CVE-2026-32326 CVSS 4

SHARP routers missing authentication for some web APIs

SHARP routers allow access to some web APIs without authentication. SHARP routers do not perform authentication for some web APIs. This has been identified as missing authentication for critical function (CWE-306). The vulnerability is tracked under CVE-2026-32326, with a CVSS v4

vulnerability
JVN
Critical
AI

A Declassified Look Inside the Dark Economy of Cybercrime

As special guest Jim Browning noted, "If there are people willing to attack you, your systems, and your business, the best way to defend yourself is to understand how they do this, who they are, and how they're working. If you understand all of that, you're far better able to pro

ai ransomware phishing
Huntress Labs
Informational
APT

Exposing a Fraudulent DPRK Candidate

Since early 2023, Nisos has provided our clients with critical insights and conducted OSINT (Open-Source Intelligence) pre-employment and insider risk investigations to mitigate the threat of North Korean (DPRK) IT worker employment schemes. In June 2025, we used a combination of

apt vpn ai
Nisos
Critical
Malware

TeamPCP deploys Iran-targeted wiper in Kubernetes attacks

The TeamPCP hacking group is targeting Kubernetes clusters with a malicious script that wipes all machines when it detects systems configured for Iran. The threat actor is responsible for the recent supply-chain attack on the Trivy vulnerability scanner, and also an NPM-based cam

malware supply-chain backdoor kubernetes
Bleeping Computer