| Stop scaling headcount. Scale your SecOps. Most security teams don’t have a talent problem, they have a noise problem. Material Security unifies your cloud workspace, providing detection and response across email, files, and accounts. From automating phishing remediation to revoking risky OAuth permissions and auditing file shares, we eliminate manual toil. Stop fighting fragmented consoles. Simplify your workspace security with Material. |
| Sponsored by Material Security |
As always, thanks to those who give a little back for their support!
Forensic Analysis
-
Forensafe
iOS MeWe -
Manuel Guerra at Glider
Análisis Forense de un Spoofing tipo Vishing. Parte 2 -
Debbie Garner at Hexordia
Digital Forensics On-Scene Triage: A Best Practice Discussion -
Matthew Plascencia
MSAB Mobile Forensics Summit 2026 iOS CTF Writeup -
System Weakness
Digital Forensics-[Ali Hadi — Web Server Case #3] -
Mike Cohen at Rapid7
Velociraptor CLI
Threat hunting/threat intelligence
-
Madeline Lawrence at Aikido
axios compromised on npm: maintainer account hijacked, RAT deployed -
Akamai
The Telnyx PyPI Compromise and the 2026 TeamPCP Supply Chain Attacks -
Any.Run
Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More -
ASEC
-
BlackFog
-
Censys
-
CERT-AGID
-
Check Point
- 30th March – Threat Intelligence Report
- ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime
- Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets
- Iran-nexus Password Spray Campaign Targeting Cloud Environments, with a Focus on the Middle East
-
Cisco’s Talos
- Ransomware in 2025: Blending in is the strategy
- UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
- Qilin EDR killer infection chain
- Inside the Talos 2025 Year in Review: A discussion on what the data means for defenders
- An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases
- The democratisation of business email compromise fraud
- Do not get high(jacked) off your own supply (chain)
- Axios NPM supply chain incident
-
Enrico Silverio at Cofense
One Click Away: Inside a LinkedIn Phishing Attack -
Christian Feuchter at Compass Security
Common Entra ID Security Assessment Findings – Part 2: Privileged Unprotected Groups -
CrowdStrike
-
Ctrl-Alt-Intel
-
Cybersec Sentinel
Axios npm Backdoored: UNC1069 Deploys Cross-Platform RAT via Supply Chain Attack -
Cyble
-
Daniel Wyleczuk-Stern
- Container Escape Telemetry, Part 1: Isolation Primitives and the eBPF Observability Model
- Container Escape Telemetry, Part 2: Methodology and Tool Architecture
- Container Escape Telemetry, Part 3: What Each Tool Actually Captured
- Container Escape Telemetry, Part 4: Volume, Signal-to-Noise, and Choosing a Tool
- Container Escape Telemetry, Part 5: Tuning eBPF Tools From Defaults to Detection
- Container Escape Telemetry, Part 6: TeamPCP and What the Lab Predicted
- Container Escape Telemetry: Series Overview
-
Christophe Tafani-Dereeper at Datadog Security Labs
Compromised axios npm package delivers cross-platform RAT -
Sebastian Degner at DCSO CyTec
From Axios NPM Supply Chain Attack to Tracking DPRK’s BlueNoroff -
Detect FYI
Threats based on Clipboards actions (+ KQL Query) -
Dr. Web
-
Elastic Security Labs
- Inside the Axios supply chain compromise – one RAT to rule them all
- Fake Installers to Monero: A Multi-Tool Mining Operation
- Elastic releases detections for the Axios supply chain compromise
- Hooked on Linux: Rootkit Detection Engineering
- How we caught the Axios supply chain attack
- Elastic Security Integrations Roundup: Q1 2026
-
Elliptic
Drift Protocol exploited for $286 million in suspected DPRK-linked attack -
Esentire
Tycoon 2FA Infrastructure Update: Threat Actors Adapt Following Global Coalition Takedown -
Flare
Code Names, Fake Personas, and Iranian Recruits: New Details from Inside the NKITW Operation -
Adolf Středa and Vladimír Žalud at Gen
Why Join the Navy if You Can Be a Pirate? -
Google Cloud Threat Intelligence
-
GreyNoise
The Invisible Army: Why IP Reputation Fails Against the Rotation Economy -
Group-IB
-
Hunt IO
-
InfoSec Write-ups
The Invisible Threat: Detecting Early-Stage Phishing & Scam Campaigns -
Intel 471
-
Invictus Incident Response
Axios Supply Chain Attack: Analysis & Incident Response -
JPCERT/CC
TSUBAME Report Overflow (Jul-Sep 2025) -
Malwarebytes
Axios supply chain attack chops away at npm trust -
Microsoft Security
-
Idan Cohen and Yael Ben Yair at Mitiga
007: License to SKILL P.2 – Slack Compromise Through Claude Code -
Allison Henao and Alice Koeninger at MITRE ATT&CK
Defense Evasion Split: A Tale of Two Tactics -
Alice Koeninger at MITRE Engage™
Where the Wild Things Are: How to Become the King of AI Agents by Embracing the Chaos -
Nextron Systems
The AIX Blind Spot – Getting Visibility Where EDR Can’t Run -
Thomas Papaloukas at NVISO Labs
The Axios npm supply chain incident: fake dependency, real backdoor -
Oleg Skulkin at ‘Know Your Adversary’
-
OpenSourceMalware
- Has TeamPCP Pivoted To Using The PureHVNC RAT?
- One of the most popular JavaScript packages on earth Axios has been compromised
- TasksJacker: Latest DPRK Attack Skips the Fake Interview and Goes Straight to Compromising GitHub Users
- The Social Engineering Playbook Attackers Use to Target OSS Maintainers
-
OSINT Team
Hunting APT29 Part 2: I Searched One ProcessID. 1,129 Events Came Back. -
OX Security
-
Palo Alto Networks
Weaponizing the Protectors: TeamPCP’s Multi-Stage Supply Chain Attack on Security Infrastructure -
Picus Security
-
Proofpoint
-
Luke Jennings at Push Security
Analysing the rise in device code phishing attacks in 2026 -
Rapid7
-
Recorded Future
Latin America and the Caribbean Cybercrime Landscape -
Thassanai McCabe and Andrew Currie at ReliaQuest
DeepLoad Malware Pairs ClickFix Delivery with AI-Generated Evasion -
Toni Dujmović at ReversingLabs
ClickFix: YARA Rules Catch What AV Misses -
SANS Internet Storm Center
- DShield (Cowrie) Honeypot Stats and When Sessions Disconnect, (Mon, Mar 30th)
- Application Control Bypass for Data Exfiltration, (Tue, Mar 31st)
- TeamPCP Supply Chain Campaign: Update 004 – Databricks Investigating Alleged Compromise, TeamPCP Runs Dual Ransomware Operations, and AstraZeneca Data Released, (Mon, Mar 30th)
- Malicious Script That Gets Rid of ADS, (Wed, Apr 1st)
- TeamPCP Supply Chain Campaign: Update 005 – First Confirmed Victim Disclosure, Post-Compromise Cloud Enumeration Documented, and Axios Attribution Narrows, (Wed, Apr 1st)
- Attempts to Exploit Exposed “Vite” Installs (CVE-2025-30208), (Thu, Apr 2nd)
- TeamPCP Supply Chain Campaign: Update 006 – CERT-EU Confirms European Commission Cloud Breach, Sportradar Details Emerge, and Mandiant Quantifies Campaign at 1,000+ SaaS Environments, (Fri, Apr 3rd)
-
Sansec
Mass PolyShell attack wave hits 471 stores in one hour -
Sekoia
New widespread EvilTokens kit: device code phishing as-a-service – Part 1 -
Seqrite
-
Simone Kraus
How Russia’s Dual-Use Cyber Infrastructure Fuels a Destructive Shadow War -
Snyk
-
Socket
-
Sophos
-
Squiblydoo
The CertGraveyard -
Team Cymru
-
The Hunter’s Ledger
-
The Raven File
Inside TeamPCP’s Shell Arsenal -
Third Eye intelligence
ThirdEye Intelligence: The Blacklist – Global Connectivity Solutions LLP -
Lauren Proehl at THOR Collective Dispatch
Vibe Coding The Holidays Away -
Trend Micro
-
Daniel Kelley at Varonis
A Quiet “Storm”: Infostealer Hijacks Sessions, Decrypts Server-Side -
Wiz
-
Chris Kelvin at Блог Solar 4RAYS
Распаковываем Smart Install Maker статически
Upcoming events/webinars
-
Magnet Forensics
-
Monolith Forensics
Monolith Mondays -
Rob Lee
Registration is OPEN: Find Evil! Hackathon for autonomous AI incident response -
Silent Push
Webinar — Shedding Light on The Dark Corners of Bulletproof Hosters
Presentations/podcasts
-
ADF Solutions
What’s New? ADF v6.3.0 Features: May 2026 -
Black Hat
Black Hat USA 2025 | Uncovering and Responding to the tj-actions Supply Chain Breach -
Cellebrite
Tip Tuesday: Validating Data in Reader -
Cisco’s Talos
[Video] The TTP Ep 21: When Attackers Become Trusted Users -
Cloud Security Podcast by Google
EP269 Reflections on RSA 2026 – Beyond AI AI AI AI AI AI AI -
Dr Josh Stroschein
-
InfoSec_Bret
IR – SOC291 – System Time Lookup Detected -
John Hammond
-
Magnet Forensics
-
MSAB
#MSABMonday – CTF Q&A Part 2 | Deep Dive into Evidence Analysis with XAMN -
Nextron Systems
The AIX Blind Spot – THOR Running on AIX 7.3 (POWER9) -
Off By One Security
Reversing and Binja: What’s New; What’s Next! …with Jordan Wiens -
Parsing the Truth: One Byte at a Time
Karen Read 1-5; Ian Whiffin Testimony P2 -
Permiso Security
Episode 8 – Introducing SandyClaw: Dynamic Analysis for Malicious Skills and Prompts -
Team Cymru
Pipeline Peril, Citrix Bleed 3.0, and the Hacktivist Playbook -
The Cyber Mentor
Getting Started With The Windows Registry -
THE Security Insights Show
The “AI” Security Insights Show Episode 288 – The Recap Edition. OOOO…Anthropic made a BooBoo! We got to meet the security legends, Clive Watson and Craig Fretwell! -
Three Buddy Problem
LLMs writing exploits, engineers losing skills, and a case for the generative OS
Malware analysis
-
Artem Baranov
Introducing the Rootkit Techniques Matrix and updates to the Guide -
CERT Polska
-
Mike at Cyber and Ramen
OtterCookie Expands Targeting to AI Coding Tools: Analysis of a Trojanized npm Campaign -
Cara Lin at Fortinet
DPRK-Related Campaigns with LNK and GitHub C2 -
Ahmad Zubair Zahid at McAfee Labs
Operation NoVoice: Rootkit Tells No Tales -
Securelist
A laughing RAT: CrystalX combines spyware, stealer, and prankware features -
Splunk
The Certificate Decoding Illusion: How Blank Grabber Stealer Hides Its Loader -
John Rainier Navato at Trend Micro
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM -
Zhassulan Zhussupov
-
ZScaler
Latest Xloader Obfuscation Methods and Network Protocol -
Шифровальщики-вымогатели The Digest “Crypto-Ransomware”
Miscellaneous
-
Brett Shavers
-
Cellebrite
A Forensic Focus Review of Cellebrite Endpoint Inspector -
Coalition, Inc
The Great Ransomware Refusal -
Craig Ball at ‘Ball in your Court’
A Dog and Its Tail: Don’t Let Version Uncertainty Cloud Linked Attachment Production -
CyberBoo
Microsoft Defender for Office 365 Part 5: Anti-Phishing & Impersonation Protection -
Josibel Mendoza at DFIR Dominican
DFIR Jobs Update – 03/30/26 -
Elcomsoft
-
Forensic Focus
- Belkasoft X Streamlines Investigations With AI-Powered Picture Analysis
- Mastering Triage: Intro To ADF Pro
- Digital Forensics Jobs Round-Up, March 30 2026
- Up To 50 GB/s: TaskForce Imagers Receive Fiber Network Extension
- Cellebrite Changes The Investigative Game With The Launch Of Genesis, The Groundbreaking Agentic AI Solution For Making Our World Safer
- Digital Forensics Round-Up, April 01 2026
- Cellebrite Launches Guardian Investigate, The AI-Powered Nerve Center That Revolutionizes How Investigative Teams Close Cases
- Learn From The Experts At Amped Connect US 2026
- Forensic Focus Digest, April 03 2026
-
Michelle Duell
Demystifying GIAC Exam Prep: Where to Start -
Shatakshi Khadke at Paraben Corporation
If Digital Evidence Could Lie: How Machines Create False Truths -
Patrick Wardle at Objective-See
No Paste for You! -
Aditya Vats at Permiso
Introducing SandyClaw – The First Dynamic Sandbox for AI Agent Skills and Prompts -
Pulsedive
Update: Introducing Pulsedive Docs -
RexorVc0
The Art of Threat Hunting -
Security Onion
6 month EOL notice for Security Onion 2.4 -
Raymond Chen at The Old New Thing
A question about the maximimum number of values in a registry key raises questions about the question -
Kurt Muhl at TrustedSec
Reduce Repetition and Free up Time With Mobile File Extractor
Software releases/updates
-
Arsenal Consulting
Arsenal Image Mounter v3.12.344 -
Canadian Centre for Cyber Security
Assemblyline v4.7.2.stable4 -
Cellebrite
-
Costas K
LNK & Jumplist Browser -
Digital Sleuth
winfor-salt v2026.5.5 -
Flip Forensics
AI Forensic Triage (AIFT) V1.4.1 – QoL improvements coming with Linux analysis -
Mandiant
Capa v9.4.0 -
Metaspike
Forensic Email Intelligence v2.3.760 -
OpenCTI
7.260401.0 -
Paraben Corporation
Paraben Corporation Unveils E3 Platform Dilithium Version 4.5 with Major Speed and Accuracy Enhancements -
Passware
Passware Kit 2026 v2 Now Available -
Phil Harvey
ExifTool 13.54 -
Security Onion
Security Onion 3.0.0 Now Available with New and Improved Interface and Much More! -
Tsurugi Linux
4 April 2026 (release 26.03)
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.