@b4n1shed

324 Followers
564 Following
29 Posts
Security Research, Threat Intelligence, Malware Analysis, Embedded Systems, Misc. Hackery and Shenanigans.

🚨 Watch out as the new #PS1Bot malware steals crypto wallets, passwords, and sensitive data, spreading through #malvertising while evading detection.

Read: https://hackread.com/malvertising-attack-crypto-stealing-ps1bot-malware/

#CyberSecurity #Malware #Crypto #Keylogger

New Malvertising Attack Spreads Crypto Stealing PS1Bot Malware

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Hackread - Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks https://thehackernews.com/2025/08/new-ps1bot-malware-campaign-uses.html
New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks

PS1Bot malvertising campaign uses in-memory PowerShell attacks since early 2025, enabling stealth data theft.

The Hacker News

Excited to announce that we just published our research into "PS1Bot" a multi-stage PowerShell-based modular malware framework being delivered via malvertising campaigns that we've been tracking throughout 2025. Check it out!

https://blog.talosintelligence.com/ps1bot-malvertising-campaign/

#malware #stealer #infosec #threatintel

Malvertising campaign leads to PS1Bot, a multi-stage malware framework

Cisco Talos has observed an ongoing malware campaign that seeks to infect victims with a multi-stage malware framework, implemented in PowerShell and C#, which we are referring to as “PS1Bot.”

Cisco Talos Blog
You Wouldn’t Download A Skateboard?

At the end of the day, a skateboard boils down to a plank of wood with some wheels. They are wonderfully simple and fun and cheap modes of transportation. But this is Hackaday, so we are not here t…

Hackaday
Researchers Unveil New Mechanism to Track Compartmentalized Cyber Threats https://gbhackers.com/new-mechanism-to-track-compartmentalized-cyber-threats/
Researchers Unveil New Mechanism to Track Compartmentalized Cyber Threats

Cisco Talos, in collaboration with The Vertex Project, has introduced an innovative approach to tackle the rising complexity.

GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Excited to announce that Asheer Malhotra, Ashley Shen, Vitor Ventura and I just published a new blog on how initial access groups are changing and propose a new taxonomy to support the latest threats that we are seeing. Check it out!

https://blog.talosintelligence.com/redefining-initial-access-brokers/

In addition, we have also published a blog proposing an extension to the Diamond Model to support more accurate and comprehensive threat modeling support for compartmentalized intrusion sets. Check it out too!

https://blog.talosintelligence.com/compartmentalized-threat-modeling/

Redefining IABs: Impacts of compartmentalization on threat tracking and modeling

Threat actors are teaming up, splitting attacks into stages and making defense harder than ever. In Part 1, Cisco Talos examines their tactics and defines their motivations.

Cisco Talos Blog
Spam campaign targeting Brazil abuses Remote Monitoring and Management tools https://blog.talosintelligence.com/spam-campaign-targeting-brazil-abuses-rmm-tools/
Spam campaign targeting Brazil abuses Remote Monitoring and Management tools

A new spam campaign is targeting Brazilian users with a clever twist — abusing the free trial period of trusted remote monitoring tools and the country’s electronic invoice system to spread malicious agents.

Cisco Talos Blog
Are you attending CTA TIPS next week? Edmund Brumaghin and Nick Biasini will dive into how multiple actors collaborate during cyber intrusions and how organizations can adapt to this evolving threat landscape. Register now: https://www.cyberthreatalliance.org/tips-conference/
TIPS CONFERENCE - Cyber Threat Alliance

The Cyber Threat Alliance (CTA) is a group of cybersecurity practitioners from organizations that have chosen to work together in good faith to share threat information for the purpose of improving defenses against advanced cyber adversaries across member organizations and their customers.

Cyber Threat Alliance
Excited to announce that @infosec_nick and I will be presenting on compartmentalization in cyber threats at the CTA TIPS conference next month! Come check it out!
Physical Key Copying Starts With A Flipper Zero

A moment’s inattention is all it takes to gather the information needed to make a physical copy of a key. It’s not necessarily an easy process, though, so if pen testing is your game, s…

Hackaday