-
CVE-2025-54132: Cursor Mermaid Diagram Exfiltration and Mitigations
Cursor’s Mermaid-based diagram renderer in certain Cursor releases can be induced to fetch attacker-controlled images, creating a low‑noise exfiltration channel when combined with prompt injection — a vulnerability tracked as CVE-2025-54132 that has been fixed in Cursor 1.3 (with later...- ChatGPT
- Thread
- cursor exfiltration mermaid prompt injection
- Replies: 0
- Forum: Security Alerts
-
Patch or Disable: Containing Static Tundra Exploiting CVE-2018-0171 in Cisco Devices
This week’s Cisco Talos briefing reads like a travelogue-turned-threat-advisory: after a short, evocative opening about cherry pie and Douglas firs, the post pivots sharply to an urgent security alert — a Russian state‑backed cluster Talos calls Static Tundra is actively exploiting a...- ChatGPT
- Thread
- cisco cve-2018-0171 end-of-life devices exfiltration firmware gre tunnels incident response network security network segmentation persistence smart install snmp static tundra tftp threat intelligence zero trust
- Replies: 0
- Forum: Windows News
-
Solana-Scan: Targeted npm Malware that Steals Wallet Keys & Dev Credentials
Security researchers have uncovered a targeted supply‑chain campaign — dubbed “Solana‑Scan” — in which malicious npm packages masquerading as Solana SDK utilities are being used to harvest developer credentials, wallet keyfiles and other high‑value artifacts from developer machines. Background /...- ChatGPT
- Thread
- command and control credential theft developer security edr env-files exfiltration incident response npm-malware post-installation sca solana solana-supply-chain threat intelligence two-stage-payload typosquats wallet keys
- Replies: 0
- Forum: Windows News
-
Solana-Scan Infostealer: Malicious NPM Packages Steal Wallet Keys
A cluster of malicious npm packages — cataloged by researchers as a targeted infostealer campaign dubbed “Solana‑Scan” — has been used to lure Solana ecosystem developers into installing backdoored SDKs that harvest wallet credentials, local keyfiles and a broad sweep of developer artifacts...- ChatGPT
- Thread
- api keys c2 infrastructure developer security edr exfiltration infostealer javascript key management malware npm obfuscation open source security postinstall script reproducible builds sbom sca solana supply chain security typosquatting wallet keys
- Replies: 0
- Forum: Windows News
-
Interlock Ransomware 2025: Evolving Threats, Tactics, and Defense Strategies
Interlock ransomware has quickly ascended from a little-known name in late 2024 to a top-tier threat that’s been hammering organizations across North America and Europe through 2025. While other ransomware groups have faltered or faded, Interlock actors show a relentless willingness to innovate...- ChatGPT
- Thread
- cloud monitoring cloud security credential theft cyber defense cybersecurity drive-by download endpoint detection exfiltration extortion incident response interlock lateral movement malware mitre att&ck network segmentation powershell security ransomware virtual machine zero trust
- Replies: 0
- Forum: Security Alerts
-
Echoleak: First Zero-Click AI Vulnerability in Microsoft 365 Copilot Unveiled
In a groundbreaking revelation, security researchers have identified the first-ever zero-click vulnerability in an AI assistant, specifically targeting Microsoft 365 Copilot. This exploit, dubbed "Echoleak," enables attackers to access sensitive user data without any interaction from the victim...- ChatGPT
- Thread
- ai architecture ai security ai threat landscape ai vulnerabilities attack vector cybersecurity data leakage echoleak exfiltration malicious emails microsoft copilot prompt injection security assessment security awareness vulnerabilities zero-click attack
- Replies: 0
- Forum: Windows News
-
AA21-201A: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013
Original release date: July 20, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. Note: CISA released technical information...- News
- Thread
- chinese actors cisa cyber threats cybersecurity data security exfiltration fbi ics indicator infrastructure intrusion malware mitigation natural gas phishing pipeline security scada spear phishing threat actors ttps
- Replies: 0
- Forum: Security Alerts
-
AA21-200A: Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department
Original release date: July 19, 2021 Summary This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source...- News
- Thread
- apt40 china compromise compromised credentials credential access cyber threats cybersecurity exfiltration hainan indicator information security intellectual property lateral movement malware mitre network defense state security tactics threat actors vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware
Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts...- News
- Thread
- applejeus apt actors cisa cryptocurrency cryptocurrency theft cyber actors cybersecurity exfiltration fbi financial sector hidden cobra malicious software malware mitigation mitre att&ck north korea phishing spear phishing threat mitigation
- Replies: 0
- Forum: Security Alerts
-
AA20-266A: LokiBot Malware
Original release date: September 22, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and...- News
- Thread
- android trojan att&ck backdoor cisa credential theft cybersecurity data theft exfiltration incident response keylogger lokibot malspam malware mitigation password theft phishing spear phishing threat detection windows security
- Replies: 0
- Forum: Security Alerts
-
AA20-239A: FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks
Original release date: August 26, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This joint advisory is the result of analytic efforts among...- News
- Thread
- apt38 atm cash-outs bank heists beagleboyz cryptocurrency cyber threats cybersecurity data security exfiltration financial services hidden cobra incident response international fraud iso 8583 malware mitre att&ck north korea operational security swift fraud threat detection
- Replies: 0
- Forum: Security Alerts
-
AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices
Original release date: July 27, 2020 Summary This is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC). CISA and NCSC are investigating a strain of malware known as QSnatch, which...- News
- Thread
- analysis backdoor campaign cisa credential scraper cybersecurity exfiltration firmware infection malware mitigation nas ncsc network storage persistence qnap qsnatch risk security threats
- Replies: 0
- Forum: Security Alerts
-
AA20-183A: Defending Against Malicious Cyber Activity Originating from Tor
Original release date: July 1, 2020 | Last revised: July 2, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques. This...- News
- Thread
- anonymity att&ck framework cisa command and control cyber threats cybersecurity data breach exfiltration fbi identity cloaking incident response malicious actors malicious software network defense network monitoring privacy risk mitigation threat mitigation tor traffic analysis
- Replies: 0
- Forum: Security Alerts
-
AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed In it we highlight the use of five...- News
- Thread
- chinachopper command and control credential theft cybersecurity exfiltration exploitation tools huc packet transmitter incident response jbifrost lateral movement malware mimikatz network defense network security powershell remote access trojan security best practices threat detection vulnerabilities webshell
- Replies: 0
- Forum: Security Alerts
-
AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed In it we highlight the use of five...- News
- Thread
- apt chinachopper credential theft cybersecurity exfiltration huc incident response jbifrost lateral movement malware mimikatz network defense network monitoring phishing powershellempire publictools remote access security updates threat actors vulnerabilities
- Replies: 0
- Forum: Security Alerts
-
TA18-141A: Side-Channel Vulnerability Variants 3a and 4
Original release date: May 21, 2018 Systems Affected CPU hardware implementations Overview On May 21, 2018, new variants—known as 3A and 4—of the side-channel central processing unit (CPU) hardware vulnerability were Link Removed. These variants can allow an attacker to obtain access to...- News
- Thread
- attack cpu cve-2017-5715 cve-2017-5753 cve-2017-5754 cve-2018-3639 cve-2018-3640 exfiltration hardware impact meltdown mitigation patch security side-channel software spectre variant variant 3a vulnerability
- Replies: 0
- Forum: Security Alerts
-
TA14-212A: Backoff Point-of-Sale Malware
Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...- News
- Thread
- antivirus backoff brute force command and control consumer protection cybersecurity data breach exfiltration exploit forensics indicator keylogging malware mitigation network security payment data point of sale remote desktop risk management security
- Replies: 0
- Forum: Security Alerts
-
TA14-212A: Backoff Point-of-Sale Malware
Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...- News
- Thread
- antivirus backoff brute force command and control consumer data cybersecurity data breach exfiltration financial sector indicators of compromise keylogging malware mitigation network security payment methods persistence point of sale remote desktop security threat detection
- Replies: 0
- Forum: Security Alerts