Advanced Fileless Remcos RAT Abusing Native Windows Tools

Pulse ID: 69d2ba26efd7dcef6be56abc
Pulse Link: https://otx.alienvault.com/pulse/69d2ba26efd7dcef6be56abc
Pulse Author: cryptocti
Created: 2026-04-05 19:38:14

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #Remcos #RemcosRAT #Windows #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Kimsuky Deploys Weaponized LNK Files to Install Python-Based Backdoor

Pulse ID: 69d2baa573c8faf15f08f4d4
Pulse Link: https://otx.alienvault.com/pulse/69d2baa573c8faf15f08f4d4
Pulse Author: cryptocti
Created: 2026-04-05 19:40:21

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #InfoSec #Kimsuky #LNK #OTX #OpenThreatExchange #Python #UK #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Possible Phishing 🎣
on: ⚠️hxxps[:]//quantumcuverify[.]weebly[.]com/
🧬 Analysis at: https://urldna.io/scan/69d29cce3b775000064cfdd1
#cybersecurity #phishing #infosec #urldna #scam #infosec

πŸ›‘οΈ #Cybersecurity news & tips across the #fediverse

β€œAndri Rohtla: Mass surveillance in Estonia 18 years and counting | Opinion https://www. byteseu.com/1918205/ # AndriRohtla # CommunicationsData # Estonia # Privacy # Prosecutor 'sOffice # SupremeCou...”

https://pubeurope.com/@byteseu/116348706128756889

πŸ€– via RSS feed. Not an endorsement.

Bytes Europe (@[email protected])

Attached: 1 image Andri Rohtla: Mass surveillance in Estonia 18 years and counting | Opinion https://www.byteseu.com/1918205/ #AndriRohtla #CommunicationsData #Estonia #Privacy #Prosecutor'sOffice #SupremeCourt #surveillance #TelecomCompanies

Mastodon

🚨 EUVD-2026-19119

πŸ“Š Score: 5.3/10 (CVSS v3.1)
πŸ“¦ Product: MAC-SQL
🏒 Vendor: wbbeyourself
πŸ“… Updated: 2026-04-05

πŸ“ A vulnerability was identified in wbbeyourself MAC-SQL up to 31a9df5e0d520be4769be57a4b9022e5e34a14f4. This affects the function _execute_sql of the file core/agents.py of the component Refiner Agent. The manipulation leads to sql injection. Remote expl...

πŸ”— https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-19119

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

🚨 EUVD-2026-19121

πŸ“Š Score: 5.3/10 (CVSS v3.1)
πŸ“¦ Product: premsql, premsql
🏒 Vendor: premAI-io
πŸ“… Updated: 2026-04-05

πŸ“ A weakness has been identified in premAI-io premsql up to 0.2.1. Affected is the function eval of the file premsql/agents/baseline/workers/followup.py. This manipulation of the argument result causes code injection. The attack is possible to be ca...

πŸ”— https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-19121

#cybersecurity #infosec #euvd #cve #vulnerability

EUVD

European Vulnerability Database

Possible Phishing 🎣
on: ⚠️hxxps[:]//izusep[.]weebly[.]com/
🧬 Analysis at: https://urldna.io/scan/69d28ebe3b775000064cfc50
#cybersecurity #phishing #infosec #urldna #scam #infosec

Hello, again and again! 

Today, I completed the Snort room, where I learned how to use both IDS and IPS modes in Snort. I practiced extensively, solved related questions, and also learned how to create custom Snort rules.

Additionally, I have successfully completed all the problem sets for CS50x and am now moving on to the final project.

#Day85 #100DaysOfCybersecurity #Cybersecurity

CVE Alert: CVE-2026-5575 - SourceCodester - Record Management System - RedPacket Security

A vulnerability was detected in SourceCodester/jkev Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file

RedPacket Security
CVE Alert: CVE-2026-5573 - Technostrobe - HI-LED-WR120-G2 - RedPacket Security

A weakness has been identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. This impacts an unknown function of the file /fs. Executing a manipulation of

RedPacket Security