Security brief: VenomRAT is defanged | Proofpoint US

What happened  VenomRAT is a commodity remote access trojan (RAT) used by multiple cybercriminal threat actors. Around since 2020 but first observed in Proofpoint data in 2022, VenomRAT

Proofpoint

New.

Group-IB: Uncovering a Multi-Stage Phishing Kit Targeting Italy's Infrastructure https://www.group-ib.com/blog/uncover-phishing-italy/ #infosec #phishing #ransomware #threatresearch

Cisco Talos Blog

Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.

Cisco Talos Blog
Bitdefender Threat Debrief | November 2025

The ALPHV Insiders: Cyber Defenders Who Cast a Shadow on Enterprise Security   This edition of the Bitdefender Threat Debrief includes coverage on the indictment of ALPHV affiliates, Qilin’s exponential growth, Sinobi’s return to our Top 10, and more.

Bitdefender Blog

Zimperium: Are Your Employees Putting Your Enterprise at Risk This Holiday Season? https://zimperium.com/blog/are-your-employees-putting-your-enterprise-at-risk-this-holiday-season

From yesterday:

NGate: NFC Relay Malware Enabling ATM Withdrawals Without Physical Cards https://zimperium.com/blog/ngate-nfc-relay-malware-enabling-atm-withdrawals-without-physical-cards @zimperium

Via Betanews: Mobile threats increase ahead of holiday shopping season https://betanews.com/2025/11/13/mobile-threats-increase-ahead-of-holiday-shopping-season/ @betanews @iandbarker #infosec #phishing #threatresearch #malware #Android #smishing @kirwed

Are Your Employees Putting Your Enterprise at Risk This Holiday Season?

Protect your enterprise this holiday season by understanding how mishing, malware, and app vulnerabilities can put your mobile-connected employees and business at risk.

New.

WatchTower: Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101) https://labs.watchtowr.com/is-it-citrixbleed4-well-no-is-it-good-also-no-citrix-netscalers-memory-leak-rxss-cve-2025-12101/ #infoec #threatresearch

Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)

There’s an elegance to vulnerability research that feels almost poetic - the quiet dance between chaos and control. It’s the art of peeling back the layers of complexity, not to destroy but to understand; to trace the fragile threads that hold systems together and see where they might

watchTowr Labs
DEV-1084 and MERCURY: Inside Iran’s DarkBit Ransomware Operations

Iran-linked DEV-1084 & MERCURY APT deploy destructive DarkBit ransomware on hybrid environments. Simulate attacks with Picus platform.

Pull a thread, unravel a sweater.

Today's #ThreatResearch blog is about uncovering a massive #phishing operation after stumbling across a single URL.

Since February, the operators of this campaign have registered more than 4300 domain names and have used it to target people with fake hotel reservation "confirmation" messages.

A short 🧵

https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign

MalKamak APT’s ShellClient RAT: Inside Operation GhostShell

MalKamak APT uses ShellClient RAT to target aerospace & telecom sectors. Detect, defend, and simulate attacks with Picus Security Validation Platform.

New.

"One of their most novel tactics involved a watering hole attack on a compromised Kuwaiti government website, where they injected a hidden HTML image tag pointing to an actor-controlled server. This was designed to passively harvest NTLM hashes from visitors by tricking their browsers into an authentication attempt."

Picus: xHunt APT: Cyber-Espionage Operations Targeting Kuwait and Exchange Servers https://www.picussecurity.com/resource/blog/xhunt-apt-cyber-espionage-operations-targeting-kuwait-and-exchange-servers #espionage #infosec #threatresearch

xHunt APT: Cyber-Espionage Operations Targeting Kuwait and Exchange Servers

Discover how xHunt APT targets Kuwait’s shipping, transport, and government sectors using Exchange backdoors — and how Picus defends against it.