New.

Any.Run: Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide https://any.run/cybersecurity-blog/kamasers-technical-analysis/ @anyrun_app #malware #infosec #threatresearch #DDoS

Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide

See how the Kamasers botnet can disrupt business operations through multi-vector DDoS attacks, resilient infrastructure, and broad attack capabilities.

ANY.RUN's Cybersecurity Blog
ClickFix Campaigns Targeting Windows and macOS

Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS. Learn how threat actors exploit native system tools with malicious, obfuscated commands to gain initial access, and get key mitigations for defense

New.

Securonix: Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments https://www.securonix.com/blog/faux-elevate-threat-actors-crypto-miners-and-infostealers/

Sekoia: Silver Fox: The Only Tax Audit Where the Fine Print Installs Malware https://blog.sekoia.io/silver-fox-the-only-tax-audit-where-the-fine-print-installs-malware/ @sekoia_io

From yesterday:

Sophos: NICKEL ALLEY strategy: Fake it ‘til you make it https://www.sophos.com/en-us/blog/nickel-alley-strategy-fake-it-til-you-make-it @SophosXOps

Wiz: KICS GitHub Action Compromised: TeamPCP Strikes Again in Supply Chain Attack https://www.wiz.io/blog/teampcp-attack-kics-github-action @wiz #GitHub #infosec #threatresearch #malware #Trivy

Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments

Securonix Threat Research: FAUX#ELEVATE is a fast-moving phishing campaign using fake resumes and obfuscated VBScript to steal credentials, exfiltrate data, and deploy crypto miners in enterprise environments.

Securonix

From yesterday.

Socket: Trivy Supply Chain Attack Expands to Compromised Docker Images https://socket.dev/blog/trivy-docker-images-compromised @SocketSecurity #infosec #threatresearch #Docker #cyberattack

Trivy Supply Chain Attack Expands to Compromised Docker Imag...

Newly published Trivy Docker images (0.69.5 and 0.69.6) were found to contain infostealer IOCs and were pushed to Docker Hub without corresponding Git...

Socket

Posted yesterday, if you missed it:

WatchTower: A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE) https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/ #infosec #threatresearch

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746)

A long, long time ago, in a land free of binary exploit mitigations, when Unix still roamed the Earth, there lived a pre-authentication Telnetd vulnerability. In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than you. To put the timespan

watchTowr Labs
Android devices ship with firmware-level malware

Keenadu malware gives an attacker control over a device but appears to be used primarily to facilitate ad fraud

SOPHOS

New.

Socket: Trivy Under Attack Again: Widespread GitHub Actions Tag Compromise Exposes CI/CD Secrets https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise @SocketSecurity #infoec #threatresearch #GitHub

Trivy Under Attack Again: Widespread GitHub Actions Tag Comp...

Attackers compromised Trivy GitHub Actions by force-updating tags to deliver malware, exposing CI/CD secrets across affected pipelines.

Socket
Analyzing the Current State of AI Use in Malware

Unit 42 research explores how AI is currently used in malware, from superficial integrations to advanced decision-making, and its future impact.

Unit 42

New.

Huntress: From W-2 to BYOVD: How a Tax Search Leads to Kernel-Mode AV/EDR Kill https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill @huntress #infosec #threatresearch

How a Tax Search Leads to Kernel-Mode AV/EDR Kill | Huntress

Huntress uncovers a tax-themed malvertising campaign using Google Ads, dual cloaking, rogue ScreenConnect, and an undocumented Huawei driver to kill AV/EDR.

Huntress
EDR killers explained: Beyond the drivers

ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers.