New.
AhnLab: A malicious LNK that spreads a Python-based backdoor and how it’s spreading (Kimsuky group) https://asec.ahnlab.com/en/93151/ #infosec #threatresearch #Python #malware

A malicious LNK that spreads a Python-based backdoor and how it's spreading (Kimsuky group) - ASEC
A malicious LNK that spreads a Python-based backdoor and how it's spreading (Kimsuky group) ASEC
ASEC
I’d come running back to EU again: TA416 resumes European government espionage campaigns | Proofpoint US
Key findings From mid-2025 onwards, the China-aligned threat actor TA416 resumed observed targeting of European government and diplomatic organizations following a period of reduced EU-
Proofpoint
Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns
BlueVoyant's Security Operations Center (SOC) reviews Augmented Marauder's multi-pronged phishing campaigns delivering the Casbaneiro banking trojan…
BlueVoyant
Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets - Check Point Research
Key Points Introduction At the beginning of 2026, Check Point Research observed a series of targeted attacks against government entities in Southeast Asia carried out via a legitimate TrueConf software installed in the targets’ environment. The investigation led to the discovery of a zero-day vulnerability in the TrueConf client, tracked as CVE-2026-3502 with a CVSS score of 7.8. […]
Check Point ResearchNew.
Any.Run: Release Notes: Cross-Platform Threat Analysis with macOS, SSL Decryption, and 1,300+ New Detections https://any.run/cybersecurity-blog/release-notes-march-2026/ @anyrun_app #infosec #threatresearch #Apple #macOS

Release Notes: SSL Decryption, macOS, Windows Server & 1300+ New Detecions
March updates in ANY.RUN bring stronger phishing detection, broader sandbox coverage with macOS and Windows Server, new detections, and fresh TI reports.
ANY.RUN's Cybersecurity Blog
Latest Xloader Obfuscation Code & C2 Protocol | ThreatLabz
Xloader version 8 continues to implement new code obfuscation techniques to hinder reverse engineering and defeat automated analysis tools.

Double Agents: Exposing Security Blind Spots in GCP Vertex AI
Unit 42 uncovers a "double agent" flaw in Google Cloud's Vertex AI, demonstrating how overprivileged AI agents can compromise cloud environments.
Unit 42Incident responders, s'il vous plait: Invites lead to odd malware events
A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway?
SOPHOS