Threat Hunt Feed (2026-03-21)
Hacker News: Best
- ArXiv declares independence from Cornell — Fri, 20 Mar 2026 04:24:11 +0000
- Matched TTPs: Server (T1584.004)
- macOS 26 breaks custom DNS settings including .internal — Thu, 19 Mar 2026 15:06:58 +0000
- Matched TTPs: DNS (T1071.004), DNS Server (T1584.002), Hardware (T1592.001), Domains (T1584.001), Server (T1584.004), Tool (T1588.002), At (T1053.002)
Krebs on Security
- Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker — Wed, 11 Mar 2026 16:20:13 +0000
- Matched TTPs: Malware (T1588.001), Domains (T1584.001), Phishing (T1566), Software (T1592.002), Credentials (T1589.001), At (T1053.002)
- Microsoft Patch Tuesday, March 2026 Edition — Wed, 11 Mar 2026 00:32:51 +0000
- Matched TTPs: Vulnerabilities (T1588.006), Server (T1584.004), Software (T1592.002), Exploits (T1588.005), At (T1053.002)
- Who is the Kimwolf Botmaster “Dort”? — Sat, 28 Feb 2026 12:01:57 +0000
- Matched TTPs: Botnet (T1584.005), Email Accounts (T1585.002), Domains (T1584.001), Server (T1584.004), Email Addresses (T1589.002), Proxy (T1090), Phishing (T1566), Software (T1592.002), At (T1053.002)
- ‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA — Fri, 20 Feb 2026 20:00:30 +0000
- Matched TTPs: VNC (T1021.005), JavaScript (T1059.007), DNS (T1071.004), Hardware (T1592.001), Botnet (T1584.005), Domains (T1584.001), Server (T1584.004), Email Addresses (T1589.002), Proxy (T1090), Tool (T1588.002), Phishing (T1566), Multi-Factor Authentication (T1556.006), Software (T1592.002), Credentials (T1589.001), Malicious Link (T1204.001), At (T1053.002)
- Kimwolf Botnet Swamps Anonymity Network I2P — Wed, 11 Feb 2026 16:08:11 +0000
- Matched TTPs: DNS (T1071.004), Botnet (T1584.005), Domains (T1584.001), Proxy (T1090), Phishing (T1566), At (T1053.002)
- Patch Tuesday, February 2026 Edition — Tue, 10 Feb 2026 21:49:53 +0000
- Matched TTPs: Vulnerabilities (T1588.006), Botnet (T1584.005), Software (T1592.002), Exploits (T1588.005), Malicious Link (T1204.001), At (T1053.002)
- Who Operates the Badbox 2.0 Botnet? — Mon, 26 Jan 2026 16:11:38 +0000
- Matched TTPs: Malware (T1588.001), Hardware (T1592.001), Botnet (T1584.005), Email Accounts (T1585.002), Domains (T1584.001), Control Panel (T1218.002), Email Addresses (T1589.002), Proxy (T1090), Firmware (T1592.003), Software (T1592.002), Social Media (T1593.001), At (T1053.002)
CISA Alerts
- Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure — Fri, 05 Dec 2025 14:35:38 EST
- Matched TTPs: VNC (T1021.005), Acquire Infrastructure (T1583), Password Guessing (T1110.001), IP Addresses (T1590.005), Network Devices (T1584.008), Vulnerabilities (T1588.006), Virtual Private Server (T1583.003), Remote Services (T1021), Vulnerability Scanning (T1595.002), Defacement (T1491), Server (T1584.004), Active Scanning (T1595), Password Spraying (T1110.003), Gather Victim Org Information (T1591), Tool (T1588.002), Brute Force (T1110), Valid Accounts (T1078), Firmware (T1592.003), Software (T1592.002), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- CISA Shares Lessons Learned from an Incident Response Engagement — Mon, 22 Sep 2025 11:12:49 EDT
- Matched TTPs: Scheduled Task (T1053.005), System Owner/User Discovery (T1033), Acquire Infrastructure (T1583), IP Addresses (T1590.005), JavaScript (T1059.007), Malware (T1588.001), Local Account (T1136.001), Local Account (T1087.001), Cron (T1053.003), Vulnerabilities (T1588.006), SSH (T1021.004), System Information Discovery (T1082), Scheduled Task/Job (T1053), Virtual Private Server (T1583.003), Indirect Command Execution (T1202), Exploit Public-Facing Application (T1190), Domains (T1584.001), Vulnerability Scanning (T1595.002), Web Shell (T1505.003), Server (T1584.004), Active Scanning (T1595), System Network Configuration Discovery (T1016), Account Discovery (T1087), Proxy (T1090), Command and Scripting Interpreter (T1059), File and Directory Discovery (T1083), System Network Connections Discovery (T1049), Web Service (T1102), Web Services (T1584.006), Process Discovery (T1057), PowerShell (T1059.001), Tool (T1588.002), Phishing (T1566), Brute Force (T1110), Valid Accounts (T1078), Exploitation for Privilege Escalation (T1068), Multi-Factor Authentication (T1556.006), Software (T1592.002), Exploits (T1588.005), Credentials (T1589.001), BITS Jobs (T1197), Server Software Component (T1505), Remote System Discovery (T1018), Network Service Discovery (T1046), Ingress Tool Transfer (T1105), At (T1053.002)
- Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System — Mon, 25 Aug 2025 09:36:40 EDT
- Matched TTPs: Acquire Infrastructure (T1583), OS Credential Dumping (T1003), Data from Configuration Repository (T1602), IP Addresses (T1590.005), Create or Modify System Process (T1543), Network Devices (T1584.008), Password Cracking (T1110.002), Malware (T1588.001), Local Account (T1136.001), Vulnerabilities (T1588.006), SSH (T1021.004), Botnet (T1584.005), Network Sniffing (T1040), Network Topology (T1590.004), System Information Discovery (T1082), Application Layer Protocol (T1071), Data from Local System (T1005), Impair Defenses (T1562), Exploit Public-Facing Application (T1190), Protocol Tunneling (T1572), Network Device Configuration Dump (T1602.002), Disable or Modify System Firewall (T1562.004), Archive Collected Data (T1560), Remote Services (T1021), Deploy Container (T1610), Server (T1584.004), Trap (T1546.005), Active Scanning (T1595), SSH Authorized Keys (T1098.004), System Network Configuration Discovery (T1016), Proxy (T1090), Command and Scripting Interpreter (T1059), Indicator Removal (T1070), Virtual Private Server (T1583.003), Container Administration Command (T1609), Compromise Infrastructure (T1584), Network Device CLI (T1059.008), Web Services (T1584.006), File Transfer Protocols (T1071.002), Gather Victim Network Information (T1590), Trusted Relationship (T1199), Account Manipulation (T1098), Exfiltration Over Alternative Protocol (T1048), Tool (T1588.002), Multi-hop Proxy (T1090.003), Brute Force (T1110), Container Service (T1543.005), Non-Standard Port (T1571), Exploitation for Privilege Escalation (T1068), Obfuscated Files or Information (T1027), Network Boundary Bridging (T1599), Firmware (T1592.003), Encrypted Channel (T1573), Software (T1592.002), Exploits (T1588.005), Credentials (T1589.001), Non-Application Layer Protocol (T1095), Python (T1059.006), Obtain Capabilities (T1588), System Services (T1569), Clear Persistence (T1070.009), Command Obfuscation (T1027.010), Systemd Service (T1543.002), Create Account (T1136), Remote Desktop Protocol (T1021.001), SNMP (MIB Dump) (T1602.001), At (T1053.002), Modify Authentication Process (T1556), Exfiltration Over Unencrypted Non-C2 Protocol (T1048.003), Local Accounts (T1078.003)
- CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization — Tue, 29 Jul 2025 13:53:52 EDT
- Matched TTPs: VNC (T1021.005), Adversary-in-the-Middle (T1557), Password Guessing (T1110.001), OS Credential Dumping (T1003), Network Devices (T1584.008), Password Cracking (T1110.002), Boot or Logon Autostart Execution (T1547), Hardware (T1592.001), Databases (T1213.006), Browser Extensions (T1176.001), Vulnerabilities (T1588.006), SSH (T1021.004), Password Managers (T1555.005), Application Layer Protocol (T1071), Impair Defenses (T1562), Remote Access Tools (T1219), Unsecured Credentials (T1552), Remote Services (T1021), Modify Registry (T1112), Server (T1584.004), Password Spraying (T1110.003), System Network Configuration Discovery (T1016), Command and Scripting Interpreter (T1059), System Network Connections Discovery (T1049), Downgrade Attack (T1562.010), Credentials In Files (T1552.001), PowerShell (T1059.001), One-Way Communication (T1102.003), Account Manipulation (T1098), Tool (T1588.002), Phishing (T1566), Brute Force (T1110), Data Manipulation (T1565), Hijack Execution Flow (T1574), Valid Accounts (T1078), Credential Stuffing (T1110.004), Firmware (T1592.003), Software (T1592.002), Credentials (T1589.001), Bidirectional Communication (T1102.002), Domain Accounts (T1078.002), Remote Desktop Protocol (T1021.001), Domain or Tenant Policy Modification (T1484), At (T1053.002), Local Accounts (T1078.003)
- #StopRansomware: Interlock — Mon, 21 Jul 2025 10:11:24 EDT
- Matched TTPs: System Owner/User Discovery (T1033), Rundll32 (T1218.011), Keylogging (T1056.001), IP Addresses (T1590.005), DNS (T1071.004), Match Legitimate Resource Name or Location (T1036.005), Boot or Logon Autostart Execution (T1547), Malware (T1588.001), Malicious File (T1204.002), Hardware (T1592.001), Vulnerabilities (T1588.006), SSH (T1021.004), DLL (T1574.001), System Service Discovery (T1007), Data from Cloud Storage (T1530), System Information Discovery (T1082), Steal or Forge Kerberos Tickets (T1558), Credentials from Password Stores (T1555), Exfiltration Over Web Service (T1567), Remote Access Tools (T1219), Domains (T1584.001), Masquerading (T1036), Process Injection (T1055), System Binary Proxy Execution (T1218), Remote Services (T1021), Credentials from Web Browsers (T1555.003), System Network Configuration Discovery (T1016), Proxy (T1090), Command and Scripting Interpreter (T1059), Indicator Removal (T1070), Web Service (T1102), Financial Theft (T1657), User Execution (T1204), PowerShell (T1059.001), File Transfer Protocols (T1071.002), Registry Run Keys / Startup Folder (T1547.001), Exfiltration Over Alternative Protocol (T1048), Tool (T1588.002), Phishing (T1566), Valid Accounts (T1078), Data Encrypted for Impact (T1486), Firmware (T1592.003), Software (T1592.002), Input Capture (T1056), Credentials (T1589.001), Exfiltration to Cloud Storage (T1567.002), Domain Accounts (T1078.002), File Deletion (T1070.004), Drive-by Compromise (T1189), Malicious Copy and Paste (T1204.004), Ingress Tool Transfer (T1105), Remote Desktop Protocol (T1021.001), Kerberoasting (T1558.003), At (T1053.002)
- Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider — Thu, 12 Jun 2025 10:29:54 EDT
- Matched TTPs: IP Addresses (T1590.005), Malware (T1588.001), Hardware (T1592.001), Vulnerabilities (T1588.006), Remote Services (T1021), Server (T1584.004), Software (T1592.002), Remote Desktop Protocol (T1021.001), At (T1053.002)
- Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations — Tue, 20 May 2025 15:20:23 EDT
- Matched TTPs: Rundll32 (T1218.011), Network Devices (T1584.008), Malware (T1588.001), Browser Extensions (T1176.001), Vulnerabilities (T1588.006), Spearphishing Link (T1598.003), Spearphishing Link (T1566.002), Spearphishing Attachment (T1598.002), Spearphishing Attachment (T1566.001), DLL (T1574.001), Automated Collection (T1119), System Information Discovery (T1082), Application Layer Protocol (T1071), Native API (T1106), Deobfuscate/Decode Files or Information (T1140), Domains (T1584.001), Masquerading (T1036), Browser Information Discovery (T1217), Server (T1584.004), PowerShell (T1059.001), Tool (T1588.002), Phishing (T1566), Obfuscated Files or Information (T1027), Software (T1592.002), Credentials (T1589.001), Query Registry (T1012), Web Protocols (T1071.001), Ingress Tool Transfer (T1105), At (T1053.002), Compression (T1027.015)
- Russian GRU Targeting Western Logistics Entities and Technology Companies — Mon, 12 May 2025 12:49:12 EDT
- Matched TTPs: Scheduled Task (T1053.005), Archive via Utility (T1560.001), Windows Management Instrumentation (T1047), Gather Victim Host Information (T1592), Password Guessing (T1110.001), OS Credential Dumping (T1003), IP Addresses (T1590.005), JavaScript (T1059.007), DNS (T1071.004), External Remote Services (T1133), Email Collection (T1114), Boot or Logon Autostart Execution (T1547), Malware (T1588.001), Domain Account (T1136.002), Domain Account (T1087.002), Malicious File (T1204.002), Hardware (T1592.001), Databases (T1213.006), Vulnerabilities (T1588.006), Spearphishing Link (T1598.003), Spearphishing Link (T1566.002), SSH (T1021.004), Spearphishing Attachment (T1598.002), Spearphishing Attachment (T1566.001), DLL (T1574.001), Automated Collection (T1119), Botnet (T1584.005), Scheduled Task/Job (T1053), Cloud Accounts (T1078.004), Cloud Accounts (T1586.003), Email Accounts (T1585.002), Email Accounts (T1586.002), Exploit Public-Facing Application (T1190), Unsecured Credentials (T1552), Content Injection (T1659), Shortcut Modification (T1547.009), Scheduled Transfer (T1029), Gather Victim Identity Information (T1589), Archive Collected Data (T1560), Remote Services (T1021), Server (T1584.004), Clear Windows Event Logs (T1070.001), Password Spraying (T1110.003), External Proxy (T1090.002), Email Addresses (T1589.002), Spearphishing Voice (T1566.004), Network Security Appliances (T1590.006), Business Relationships (T1591.002), Video Capture (T1125), Account Discovery (T1087), Proxy (T1090), Command and Scripting Interpreter (T1059), Indicator Removal (T1070), Compromise Accounts (T1586), Multi-Stage Channels (T1104), Execution Guardrails (T1480), Web Services (T1584.006), User Execution (T1204), Group Policy Preferences (T1552.006), Gather Victim Org Information (T1591), PowerShell (T1059.001), Registry Run Keys / Startup Folder (T1547.001), Trusted Relationship (T1199), Account Manipulation (T1098), Exfiltration Over Alternative Protocol (T1048), Tool (T1588.002), Phishing (T1566), Multi-hop Proxy (T1090.003), Brute Force (T1110), Hijack Execution Flow (T1574), Multi-Factor Authentication (T1556.006), Remote Email Collection (T1114.002), Forced Authentication (T1187), Firmware (T1592.003), Encrypted Channel (T1573), Software (T1592.002), Input Capture (T1056), Credentials (T1589.001), Python (T1059.006), Identify Roles (T1591.004), Windows Command Shell (T1059.003), Multi-Factor Authentication Interception (T1111), Visual Basic (T1059.005), Additional Email Delegate Permissions (T1098.002), Remote Desktop Protocol (T1021.001), Hide Infrastructure (T1665), NTDS (T1003.003), Malicious Link (T1204.001), At (T1053.002), Modify Authentication Process (T1556)
- Fast Flux: A National Security Threat — Tue, 01 Apr 2025 15:00:21 EDT
- Matched TTPs: IP Addresses (T1590.005), DNS (T1071.004), Malware (T1588.001), Fast Flux DNS (T1568.001), Vulnerabilities (T1588.006), Botnet (T1584.005), Domains (T1584.001), Server (T1584.004), Dynamic Resolution (T1568), Phishing (T1566), At (T1053.002)
- #StopRansomware: Medusa Ransomware — Tue, 11 Mar 2025 10:52:42 EDT
- Matched TTPs: Windows Management Instrumentation (T1047), OS Credential Dumping (T1003), Encrypted/Encoded File (T1027.013), IP Addresses (T1590.005), DNS (T1071.004), Permission Groups Discovery (T1069), Service Stop (T1489), Malware (T1588.001), Domain Account (T1136.002), Databases (T1213.006), Domain Groups (T1069.002), Vulnerabilities (T1588.006), SSH (T1021.004), DLL (T1574.001), Network Share Discovery (T1135), System Information Discovery (T1082), Application Layer Protocol (T1071), Clear Command History (T1070.003), Impair Defenses (T1562), Exploit Public-Facing Application (T1190), Exfiltration Over Web Service (T1567), Remote Access Tools (T1219), Remote Services (T1021), Server (T1584.004), LSASS Memory (T1003.001), Email Addresses (T1589.002), System Network Configuration Discovery (T1016), Proxy (T1090), Command and Scripting Interpreter (T1059), Indicator Removal (T1070), File and Directory Discovery (T1083), Web Service (T1102), Financial Theft (T1657), Software Deployment Tools (T1072), PowerShell (T1059.001), Tool (T1588.002), Phishing (T1566), Disable or Modify Tools (T1562.001), Obfuscated Files or Information (T1027), Data Encrypted for Impact (T1486), Firmware (T1592.003), Software (T1592.002), Credentials (T1589.001), Exfiltration to Cloud Storage (T1567.002), System Services (T1569), Windows Command Shell (T1059.003), Web Protocols (T1071.001), Create Account (T1136), Network Service Discovery (T1046), Ingress Tool Transfer (T1105), Remote Desktop Protocol (T1021.001), Service Execution (T1569.002), At (T1053.002), Inhibit System Recovery (T1490), Compression (T1027.015), System Shutdown/Reboot (T1529), MMC (T1218.014)
BleepingComputer
- FBI links Signal phishing attacks to Russian intelligence services — Fri, 20 Mar 2026 16:45:52 -0400
- Matched TTPs: IP Addresses (T1590.005), Malware (T1588.001), Hardware (T1592.001), Vulnerabilities (T1588.006), Tool (T1588.002), Phishing (T1566), Software (T1592.002), At (T1053.002)
- Oracle pushes emergency fix for critical Identity Manager RCE flaw — Fri, 20 Mar 2026 14:48:47 -0400
- Matched TTPs: Malware (T1588.001), Hardware (T1592.001), Vulnerabilities (T1588.006), Web Services (T1584.006), Tool (T1588.002), Phishing (T1566), Software (T1592.002)
- Bitrefill blames North Korean Lazarus group for cyberattack — Thu, 19 Mar 2026 13:08:24 -0400
- Matched TTPs: IP Addresses (T1590.005), JavaScript (T1059.007), Malware (T1588.001), Hardware (T1592.001), Email Addresses (T1589.002), Tool (T1588.002), Phishing (T1566), Software (T1592.002), Credentials (T1589.001), At (T1053.002)
- 7 Ways to Prevent Privilege Escalation via Password Resets — Thu, 19 Mar 2026 10:00:10 -0400
- Matched TTPs: Malware (T1588.001), Hardware (T1592.001), Email Accounts (T1585.002), Tool (T1588.002), Phishing (T1566), Multi-Factor Authentication (T1556.006), Software (T1592.002), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
Darkreading
- Patch Now: Oracle’s Fusion Middleware Has Critical RCE Flaw — Fri, 20 Mar 2026 19:30:19 GMT
- Matched TTPs: Web Services (T1584.006)
- Cyber OpSec Fail: Beast Gang Exposes Ransomware Server — Fri, 20 Mar 2026 16:31:33 GMT
- Matched TTPs: Server (T1584.004)
- C2 Implant ‘SnappyClient’ Targets Crypto Wallets — Wed, 18 Mar 2026 21:49:02 GMT
- Matched TTPs: Malware (T1588.001)
- DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike — Wed, 18 Mar 2026 21:15:38 GMT
- Matched TTPs: Vulnerabilities (T1588.006)
- Researchers: Meta, TikTok Steal Personal & Financial Info When Users Click Ads — Wed, 18 Mar 2026 13:00:00 GMT
- Matched TTPs: Social Media (T1593.001)
- SideWinder Espionage Campaign Expands Across Southeast Asia — Wed, 18 Mar 2026 13:00:00 GMT
- Matched TTPs: Vulnerabilities (T1588.006), Phishing (T1566)
- More Attackers Are Logging In, Not Breaking In — Tue, 17 Mar 2026 22:04:46 GMT
- Matched TTPs: Malware (T1588.001)
- Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish — Tue, 17 Mar 2026 19:41:24 GMT
- Matched TTPs: Domains (T1584.001), Phishing (T1566), Credentials (T1589.001), At (T1053.002)
- GlassWorm Malware Evolves to Hide in Dependencies — Mon, 16 Mar 2026 20:30:04 GMT
- Matched TTPs: Malware (T1588.001), Software (T1592.002)
- Will AI Save Consumers From Smartphone-Based Phishing Attacks? — Fri, 13 Mar 2026 15:57:47 GMT
- Matched TTPs: Phishing (T1566)
- Most Google Cloud Attacks Start With Bug Exploitation — Fri, 13 Mar 2026 13:20:58 GMT
- Matched TTPs: Exploits (T1588.005), Credentials (T1589.001)
- Real-Time Banking Trojan Strikes Brazil’s Pix Users — Fri, 13 Mar 2026 13:00:00 GMT
- Matched TTPs: Malware (T1588.001)
The Hacker News
- Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager — Sat, 21 Mar 2026 15:54:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Web Services (T1584.006), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001)
- Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages — Sat, 21 Mar 2026 13:55:00 +0530
- Matched TTPs: Artificial Intelligence (T1588.007), Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Tool (T1588.002), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), Python (T1059.006), Systemd Service (T1543.002), At (T1053.002), Dead Drop Resolver (T1102.001)
- CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026 — Sat, 21 Mar 2026 13:55:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Tool (T1588.002), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001)
- Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets — Fri, 20 Mar 2026 23:17:00 +0530
- Matched TTPs: Malware (T1588.001), Databases (T1213.006), Vulnerabilities (T1588.006), SSH (T1021.004), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), Python (T1059.006), Systemd Service (T1543.002), At (T1053.002)
- Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure — Fri, 20 Mar 2026 20:45:00 +0530
- Matched TTPs: Artificial Intelligence (T1588.007), Malware (T1588.001), Databases (T1213.006), Vulnerabilities (T1588.006), Supply Chain Compromise (T1195), Server (T1584.004), Trap (T1546.005), Proxy (T1090), Phishing (T1566), Software (T1592.002), Exploits (T1588.005), Social Media (T1593.001), Credentials (T1589.001), Python (T1059.006), At (T1053.002), Compression (T1027.015)
- Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams — Fri, 20 Mar 2026 16:27:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks — Fri, 20 Mar 2026 15:30:00 +0530
- Matched TTPs: Artificial Intelligence (T1588.007), Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers — Fri, 20 Mar 2026 00:46:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Software (T1592.002), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- 54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security — Fri, 20 Mar 2026 00:22:00 +0530
- Matched TTPs: Malware (T1588.001), Hardware (T1592.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Tool (T1588.002), Phishing (T1566), Software (T1592.002), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More — Thu, 19 Mar 2026 19:55:00 +0530
- Matched TTPs: Keylogging (T1056.001), Artificial Intelligence (T1588.007), JavaScript (T1059.007), Malware (T1588.001), Vulnerabilities (T1588.006), Domains (T1584.001), Server (T1584.004), Trap (T1546.005), Tool (T1588.002), Phishing (T1566), Multi-Factor Authentication (T1556.006), Software (T1592.002), Exploits (T1588.005), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data — Thu, 19 Mar 2026 18:13:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- How Ceros Gives Security Teams Visibility and Control in Claude Code — Thu, 19 Mar 2026 16:28:00 +0530
- Matched TTPs: Artificial Intelligence (T1588.007), Malware (T1588.001), Hardware (T1592.001), Databases (T1213.006), Vulnerabilities (T1588.006), SSH (T1021.004), Server (T1584.004), Trap (T1546.005), Tool (T1588.002), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover — Thu, 19 Mar 2026 14:44:00 +0530
- Matched TTPs: JavaScript (T1059.007), Malware (T1588.001), Vulnerabilities (T1588.006), Domains (T1584.001), Server (T1584.004), Trap (T1546.005), Proxy (T1090), Phishing (T1566), Exploits (T1588.005), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks — Thu, 19 Mar 2026 11:35:00 +0530
- Matched TTPs: Sharepoint (T1213.002), JavaScript (T1059.007), DNS (T1071.004), Network Devices (T1584.008), Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Software (T1592.002), Exploits (T1588.005), Social Media (T1593.001), Credentials (T1589.001)
- Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access — Wed, 18 Mar 2026 21:30:00 +0530
- Matched TTPs: JavaScript (T1059.007), Malvertising (T1583.008), Malware (T1588.001), Hardware (T1592.001), Cron (T1053.003), Vulnerabilities (T1588.006), Web Shell (T1505.003), Server (T1584.004), Trap (T1546.005), Proxy (T1090), Shell History (T1552.003), PowerShell (T1059.001), Tool (T1588.002), Phishing (T1566), Software (T1592.002), Exploits (T1588.005), Social Media (T1593.001), Credentials (T1589.001), Remote Desktop Software (T1219.002)
- 9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors — Wed, 18 Mar 2026 17:12:00 +0530
- Matched TTPs: Malware (T1588.001), Hardware (T1592.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Multi-Factor Authentication (T1556.006), Firmware (T1592.003), Software (T1592.002), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels — Wed, 18 Mar 2026 16:00:00 +0530
- Matched TTPs: Malware (T1588.001), Databases (T1213.006), Vulnerabilities (T1588.006), Code Signing (T1553.002), Domains (T1584.001), Server (T1584.004), Trap (T1546.005), Tool (T1588.002), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE — Tue, 17 Mar 2026 22:09:00 +0530
- Matched TTPs: Artificial Intelligence (T1588.007), DNS (T1071.004), Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Web Services (T1584.006), Tool (T1588.002), Phishing (T1566), Software (T1592.002), Social Media (T1593.001), Credentials (T1589.001), Bidirectional Communication (T1102.002), Python (T1059.006), Malicious Link (T1204.001), At (T1053.002)
- LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader — Tue, 17 Mar 2026 20:04:00 +0530
- Matched TTPs: JavaScript (T1059.007), Malware (T1588.001), Vulnerabilities (T1588.006), DLL (T1574.001), Msiexec (T1218.007), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
- Konni Deploys EndRAT Through Phishing, Uses KakaoTalk to Propagate Malware — Tue, 17 Mar 2026 15:23:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001)
- CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths — Tue, 17 Mar 2026 10:53:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Lua (T1059.011), Software (T1592.002), Exploits (T1588.005), Social Media (T1593.001), Credentials (T1589.001), At (T1053.002)
Threat Hunt Feed (2026-03-21)
BleepingComputer
- Trivy vulnerability scanner breach pushed infostealer via GitHub Actions — Sat, 21 Mar 2026 13:30:41 -0400
- Matched TTPs: JavaScript (T1059.007), Malware (T1588.001), Hardware (T1592.001), Vulnerabilities (T1588.006), SSH (T1021.004), Private Keys (T1552.004), Server (T1584.004), Code Repositories (T1213.003), Shell History (T1552.003), Tool (T1588.002), Phishing (T1566), Software (T1592.002), Credentials (T1589.001), Python (T1059.006), Systemd Service (T1543.002), At (T1053.002)
- Microsoft Azure Monitor alerts abused for callback phishing attacks — Sat, 21 Mar 2026 10:09:19 -0400
- Matched TTPs: Malware (T1588.001), Hardware (T1592.001), Tool (T1588.002), Phishing (T1566), Software (T1592.002), At (T1053.002)
The Hacker News
- FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks — Sat, 21 Mar 2026 18:47:00 +0530
- Matched TTPs: Malware (T1588.001), Vulnerabilities (T1588.006), Server (T1584.004), Trap (T1546.005), Phishing (T1566), Social Media (T1593.001), Credentials (T1589.001), Messaging Applications (T1213.005)