| If you’re organisation is interested in sponsoring an upcoming post then reach out via the contact form! |
| No sponsor this week |
As always, thanks to those who give a little back for their support!
Forensic Analysis
-
Andrew Garrett
Why iOS and Android Handle GPS Differently and What It Means for Accuracy and Digital Forensics -
Oleg Afonin at Elcomsoft
Using the Extraction Agent in 2026: Compatibility, Signing, Firewall, and Extraction Tips -
Howard Oakley at ‘The Eclectic Light Company’
-
Marco Neumann at ‘Be-binary 4n6’
Beyond the C — SEGB and Biome Forensics with crush -
North Loop Consulting
Raising a Ghost: Reviving Actions Taken by a Deleted iOS App -
OSINT Team
-
Seth Enoka
Prefetch: Execution Evidence and Its Limits -
Steve Whalen at Sumuri
Why APFS Snapshots Change Everything in Mac Forensics -
The DFIR Report
Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware
Threat hunting/threat intelligence
-
Abdul Mhanni
Shai Hulud and Looking Into the Deep End of Supply Chain Mayhem -
Acronis
The remote access blind spot: An analysis of RMM tool risk for SMBs -
Raphael Silva at Aikido
Mini Shai-Hulud Is Back: npm Worm Hits over 160 Packages, including Mistral and Tanstack -
Arctic Wolf
Mini Shai-Hulud: Supply Chain Malware Attack -
Jason Palmer and Nadia Mahmood at AWS Security
Detecting and preventing crypto mining in your AWS environment -
Axelarator
We Have Packet Capture at Home -
Derek Rush at Bishop Fox
Otto Support – Logging and Visibility in MCP Servers -
Bitdefender
-
Gábor Lázár at Black Cell
Detection-as-Code Feed – 2026 April -
Rebecca Harpur at BlackFog
Breaking Down CoPhish: How Copilot Studio Became a Phishing Platform -
Brad Duncan at Malware Traffic Analysis
2026-05-11: Google ad for Claude leads to macOS malware infection -
Brian Krebs at ‘Krebs on Security’
Patch Tuesday, May 2026 Edition -
Daniel Whitcombe at Bridewell
Tycoon 2FA Strikes Back: Why a Global Takedown Only Lasted 2 Weeks -
Censys
The Ultimate Guide to Detection Engineering with Censys -
CERT-AGID
-
Check Point
-
Cisco’s Talos
-
CrowdStrike
Now Live: The CrowdStrike 2026 Financial Services Threat Landscape Report -
CTF导航
-
Cybersec Sentinel
Fake Claude Code Install Guide Hides MacSync Infostealer in Active Google Ads Campaign -
Datadog Security Labs
-
Detect FYI
-
Disconinja
Weekly Threat Infrastructure Investigation(Week20) -
Esentire
-
Fabian Bader at Cloudbrothers
Now You See Me: AADGraphActivityLogs -
FalconFeeds
-
Andréanne Bergeron at Flare
One Out of Four Infostealer Victims Have Corporate Infrastructure Access -
Yun Zheng Hu and Mick Koomen at Fox-IT
Three Lazarus RATs coming for your cheese -
Google Cloud Threat Intelligence
-
Anthony Gerlach and Anton Fomin at Group-IB
The French 2-Step: Exposing a Multi-stage Scam Targeting the National Railway Company in France -
Hack for Lab
- Living-off-the-Cloud Attack-Chain Detection: CloudTrail and VPC Flow Fusion
- Insider Threat Detection from VPC Flow Logs (UEBA Without Endpoints)
- Kubernetes East-West Attack Hunting from VPC Flow Logs
- Tor and Anonymizer Egress Hunting on VPC Flow Logs
- Cloud Cryptojacking Detection at Scale: Mining-Pool Hunting on AWS
- TLS Fingerprinting (JA3, JA4, JARM) for Encrypted C2 Hunting
- DGA and DNS-Tunnel Hunting at Scale on VPC Flow Logs
-
Hudson Rock
How The Gentlemen Ransomware Group Operates: A Blueprint Built on Infostealer Credentials -
Hunt IO
-
Huntress
-
Chris Campbell at Inde
Collapsing Grace Period: When Your Adversaries Never Tire -
Maël Le Touz and Elena Puga at Infoblox
Lookalike Domains Expose the iPhone Theft Economy -
InfoSec Write-ups
-
Invictus Incident Response
How to respond to an incident in Kubernetes | EKS | Invictus Incident Response -
Jonathan Johnson
EtwWatcher -
Keisuke Shikano at JPCERT/CC
TSUBAME Report Overflow (Oct-Dec 2025) -
Kim Zetter at ZERO DAY
-
Bert-Jan Pals at KQL Query
[DxBP] Part 2 – Detection Engineering Best Practices: Performance, Readability & Maintenance -
Lab52
Trends in Radio Frequency Spectrum Activity and Its Impact on the Geopolitical Landscape -
Matthew Plascencia
Vulnerability spotlight: CopyFail and DirtyFrag -
Microsoft Security
- Accelerating detection engineering using AI-assisted synthetic attack logs generation
- Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise
- Kazuar: Anatomy of a nation-state botnet
- When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps
-
Ray Fernandez at Moonlock
Malicious Homebrew ads are spreading MacSync stealer -
Mostafa Farghaly
Chinese Smishing Campaign: How a Large-Scale Phishing Kit is Targeting 80+ Brands Across 20 Countries -
Jarrett Polcari at Nebulock
AI Artifacts: A New Layer of Endpoint Activity to Hunt -
Oleg Skulkin at ‘Know Your Adversary’
392. MuddyWater Abuses Sendit for Data Exfiltration -
OpenSourceMalware
-
OX Security
- “Shai-Hulud, Here We Go Again”: 170+ Packages Hit Across npm & PyPi
- New MCP Security Flaws: Kubectl-mcp-server, Archon OS, and MarkItDown Vulnerabilities
- CVE-2025-65719: Critical RCE in Kubectl MCP Server
- MarkItDown MCP Exposes Developer Machines to File Theft
- CVE-2025-69443: Archon OS Vulnerable To Unauthenticated Web-To-Client Attack
- Shai-Hulud Goes Open Source: Malware Creators Leak Their Own Code to GitHub
- node-ipc npm Package Breached, Spreading Infostealer Malware
-
Stav Setty, Tom Fakterman and Shachar Roitman at Palo Alto Networks
Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools -
Proofpoint
Device Code Phishing is an Evolution in Identity Takeover -
ptwistedworld
Enabling your Linux lab to monitor Copy Fail, DirtyFrag, and Fragnesia behavior for detection… -
Kelly Davenport at Push Security
How we built an agentic threat hunting pipeline at Push -
Thomas Gardner at Red Canary
Investigating server compromises with cgroups: A Linux DFIR primer -
ReliaQuest
-
Rohit Sadgune at Hack for Lab
- Adaptive C2 Beacon Detection: FFT and DBSCAN on VPC Flow Logs
- Lateral Movement Detection via Graph Analysis on VPC Flow Logs
- Detecting Low-and-Slow Data Exfiltration with Isolation Forest + LSTM
- Living-off-the-Land Kill Chain Detection with Markov Chains
- Hunting Botnet Coordination and DDoS Staging with Clustering
-
Aditya Ganjam Mahesh at S-RM
Ransomware in focus: The Gentlemen -
SANS Internet Storm Center
- YARA-X 1.16.0 Release, (Sun, May 10th)
- Why we use CAPTCHAs, (Mon, May 11th)
- Apple Patches Everything, (Mon, May 11th)
- Proxying the Unproxyable? Sending EXE traffic to a Proxy, (Wed, May 13th)
- Microsoft May 2026 Patch Tuesday, (Tue, May 12th)
- [GUEST DIARY] Tearing apart website fraud to see how it works., (Wed, May 13th)
- Simple bypass of the link preview function in Outlook Junk folder, (Thu, May 14th)
- [Guest Diary] New Malware Libraries means New Signatures, (Fri, May 15th)
-
Sansec
-
Securelist
-
SentinelOne
Living Off the Pipeline: Defending Against CI/CD Subversion -
Snyk
-
Socket
-
SOCRadar
-
Splunk
Behind the Code: The Layered Defense-Evasion of VIP Keylogger -
Scott Lang at Spur
2026 IP Intelligence Study: The Gap Between Data and Decisions -
Edward Roberts at Stairwell
Deep Dive: YARA at Scale – Why the Best Threat Hunting Tool Is Underused, and What Continuous File Intelligence Fixes -
Step Security
-
Marco A. De Felice aka amvinfe at SuspectFile
Ransomware, Transparency, and Invisible Victims: Dissent Responds to the Instructure Case -
Symantec Enterprise
-
System Weakness
- Deep Diving into Digital Extortion: A Comparative Malware Analysis of WannaCrypt and AsyncRAT Phase 1
- Deep Diving into Digital Extortion: A Comparative Malware Analysis of WannaCrypt and AsyncRAT Phase 2
- LetsDefend | SOC124 — Scheduled Task Created
- Catching APT29 staging malware in 197k+ Sysmon events (and why your detection rule misses it)
-
The Hunter’s Ledger
- Multi-Cluster Open-Directory Tenancy on 79.137.192.3 — Rhadamanthys MaaS Customer Loader, BellaMain Turkish PhaaS, and Inkognito VPN/Phishing
- Inkognito — Russian-Speaking Multi-Product Fraud Operator (INK VPN, INK Lens 467+ Brand-Impersonation Phishing Library, BEC Burn Domains, CryptOne Fake Exchange)
- BellaMain — Turkish Phishing-as-a-Service Panel with USOM Self-Monitor, Four-Bot Telegram C2, On-Demand TRUNCATE Anti-Forensics, and Wadanz Code-Author Signature
-
ThreatMon
-
Trend Micro
- Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia
- Vibe Hacking: Two AI-Augmented Campaigns Target Government and Financial Sectors in Latin America
- Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft
-
Nick Thanos at Triskele Labs
How SafePay is Targeting Australian Organisations with Borrowed Code and Calculated Precision -
UnderDefense
Anatomy of a Targeted Phishing Attack: How We Caught a DocuSign Impersonation Campaign -
Kenneth Kinion at Valdin
YouTube DMCA Phishing Infrastructure: Six Months Later -
Lucie Cardiet at Vectra AI
Shai-Hulud Part 2: When the Worm Forged Its Own Security Certificate by Lucie Cardiet -
Julian Wolf at VMRay
Threat Intelligence Insights: Pivoting off the Blockchain -
Rami McCarthy, Amitai Cohen, and Benjamin Read at Wiz
Mini Shai-Hulud Strikes Again: TanStack + more npm Packages Compromised -
Yarix
Unusual Data Exfiltration Paths: Leveraging Rclone for SharePoint Data Theft
Upcoming events/webinars
-
ADF Solutions
-
Black Hills Information Security
-
Rebecca Harpur at BlackFog
WEBINAR: The Ransomware Groups Defining Q1 2026 – Register now! -
Magnet Forensics
-
SentinelOne
LABScon25 Replay | Breach Alpha: Trading on Cyber Fallout -
Nick Roy at Silent Push
Use Case Deep Dive: A Domain Just Appeared in Your Logs. Is It a Threat?
Presentations/podcasts
-
ADF Solutions
-
Black Hills Information Security
-
Cloud Security Podcast by Google
-
Cyber Secrets
-
CYBERWARCON
-
Dr Josh Stroschein
[Workshop] Anti-Analysis Logic – Inspecting the .cctor & Anti-Debug -
Huntress
Why Attackers Don’t Need Zero-Days (And What You’re Actually Missing) -
InfoSec_Bret
Challenge – Android Forensics -
Jai Minton at Breach Log
Ep5: Revealing Rootkits -
John Hammond
The Payload Podcast 006 -
Magnet Forensics
AI Unpacked S2:E3 // A tale of two outputs – man vs. the machine -
Matthew Plascencia
Linux Local Privilege Escalation | CopyFail & DirtyFrag -
Monolith Forensics
-
MyDFIR
-
Off By One Security
The Challenges of Building an AI-driven Security Testing Platform and How We Solved Them -
Parsing The Truth: One Byte at a Time Podcast
S1 E52: Karen Read 1-11 Lessons Learned -
Proofpoint
The Phishing Explosion No One Saw Coming -
Sumuri
How to Navigate the iOS Triage Results Screen in RECON ITR v26.0 | Filters, Bookmarks, and Reports -
Team Cymru
The Canvas Breach, AI-Enabled Intrusions, and APT-29’s Easter Bunny -
The Cyber Mentor
LIVE: 🕵️ HTB Sherlocks! | Cybersecurity | Blue Team -
The Weekly Purple Team
🦀 OpenClaw as a C2 — And How to Catch It -
THOR Collective Dispatch
Ask-a-Thrunt3r: April 2026 — Signal vs Myth 🐏 -
Three Buddy Problem
Malware analysis
-
Moises Cerqueira at Any.Run
LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises -
ASEC
-
BI.Zone
Tinker Tailor Soldier: Paper Werewolf’s latest toolkit -
Dark Atlas
Phantom Stealer Analysis: Inside the Two-Layer Attack Chain Hidden Behind a Windows DLL -
Winnie Lin and Yurren Wan at Fortinet
PureLogs: Delivery via PawsRunner Steganography -
Nicole Fishbein at Intezer
OrBit (Re)turns: Tracking an open-source Linux rootkit across four years of forks and deployments -
Harshil Patel and Sakshi Jaiswal at McAfee Labs
Sinkholing CountLoader: Insights into Its Recent Campaign -
Pranay Kumar Chhaparwal and Mark Lim at Palo Alto Networks
Gremlin Stealer’s Evolved Tactics: Hiding in Plain Sight With Resource Files -
Qi’anxin X Lab
Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment -
Sophos
-
Michael Clark at Sysdig
NATS-as-C2: Inside a new technique attackers are using to harvest cloud credentials and AI API keys -
ThreatFabric
New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps -
Damien Schaeffer at WeLiveSecurity
FrostyNeighbor: Fresh mischief and digital shenanigans -
Шифровальщики-вымогатели The Digest “Crypto-Ransomware”
Miscellaneous
-
Amnesty International Security Lab
Android Intrusion Logging as a new source of data for consensual forensic analysis -
Brett Shavers
-
Cellebrite
-
Brian Carrier at Cyber Triage
DFIR + AI Primer: Using AI in AWS Bedrock for Better Data Privacy -
CyberBoo
Microsoft Defender for Office 365 Part 9: Automated Investigation & Response (AIR) -
Derek Eiri
Dell Machines and WinFE -
Fabian Mendoza at DFIR Dominican
DFIR Jobs Update – 05/11/26 -
Elastic Security Labs
Elastic Security MCP App: Interactive security operations inside your AI Tools -
Forensic Focus
-
Magnet Forensics
-
Amber Schroader at Paraben Corporation
Understanding the Risks of AI in Investigations -
Andreas Misje at Velocidex (Rapid7)
Alerts and e-mail notifications in Velociraptor -
Shaji Damodharan at ADF Solutions
-
Simone Kraus
From a Risk-Based SOC to a Threat-Informed SOC -
Steve Whalen at Sumuri
AI Is Already Entering Investigative Workflows. Are We Thinking Enough About the Hardware? -
Ryan G. Cox at The Cybersec Café
How AI Has Changed My Security Engineering Workflow -
Thomas Millar at TrustedSec
Slamming the Door on Quick Assist Tech Support Scams and Abuse
Software releases/updates
-
Daniel Benzano
RDPuzzle v0.1.0 -
Digital Sleuth
winfor-salt v2026.8.18 -
Doug Burks
ohmypcap v2.1.0 -
Eric Zimmerman
ChangeLog -
Ghassan Elsman
Crow-Eye v0.10.1 -
IsoBuster
IsoBuster 5.8 released -
Kevin Stokes
xways-updater -
LEAPPs Org
LAVA First public beta release bug fix -
Metaspike
Forensic Email Collector (FEC) Changelog – 4.4.803.1410 -
Microsoft
msticpy v3.0.1 -
Joachim Metz at Open Source DFIR
Plaso 20260512 released -
OpenCTI
7.260515.0 -
TobyG at sentinel.blog
Sentinel-As-Code: Wave 3 -
Xways
-
Victor M. Alvarez at YARA-X
YARA-X just got faster
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.