| If you’re organisation is interested in sponsoring an upcoming post then reach out via the contact form! |
| No sponsor this week |
As always, thanks to those who give a little back for their support!
Forensic Analysis
-
Andrea Fortuna
PowerShell DFIR 2026: from MemProcFS-Analyzer to KAPE-style mini-timeline -
Andrew Garrett
What Do You Do If the Prosecution Uploads Child P*rnography to Your Cloud Storage? -
Elcomsoft
-
Forensafe
Memory Network -
James McGee at The Metadata Perspective
Empirical Assessment of Apple Health Activity Data: Accuracy, Granularity, and Database Artifacts
Threat hunting/threat intelligence
-
Abdul Mhanni
The Gold Mine Red Teamers Never Touch -
Abdulrehman Ali
Static Kitten APT Adversary Simulation -
Larry Cashdollar at Akamai
Decentralized Threat: Stealthy P2P Cryptominer Targeting Ollama Endpoints -
ASEC
-
Brad Duncan at Malware Traffic Analysis
2026-05-22: SmartApeSG ClickFix –> Unidentified RAT –> NetSupport RAT -
Brian Krebs at ‘Krebs on Security’
-
CERT Ukraine
Оновлений інструментарій UAC-0057: OYSTERFRESH, OYSTERSHUCK та OYSTERBLUES -
CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 16 – 22 maggio -
Check Point
-
Cofense
-
Cyber Triage
How to Use EDR Telemetry in DFIR: 3 Investigation Methods Compared -
Cybersec Sentinel
China APT Webworm Hides European Government Espionage Traffic Inside Discord and Microsoft Cloud -
Cyble
JOMANGY: INJ3CTOR3’s Self-Healing FreePBX Toll Fraud Campaign -
Detect FYI
-
Disconinja
Weekly Threat Infrastructure Investigation(Week21) -
EclecticIQ
SEO poisoning campaign leverages Gemini and Claude Code impersonation to deliver infostealer -
Adam Metcalfe-Pearce at F5 Labs
Microsoft Exchange ProxyShell Scanning Doubles in April 2026 as Two Distinct Campaign Clusters Emerge -
Flare
The World Cup Fraud Infrastructure is Nearly Three Times Larger Than We First Reported -
Flashpoint
AI Threat Report: How Artificial Intelligence Is Used Across Illicit Communities -
Akshat Pradhan at Fortinet
Misconfigured, Enrolled and Dormant: Anatomy of a P2Pinfect Kubernetes Compromise -
Florian Kuckelkorn at G Data Software
An AI-generated phishing attack on myself: How Cybercriminals Use ChatGPT and Similar Tools -
Alexis Wales at GitHub
Investigating unauthorized access to GitHub-owned repositories -
GreyNoise
-
Group-IB
Volume Obfuscation Game: The Lead Data Brokers Out To Waste Your Time -
Kenneth Yeung at Hidden Layer
Tokenization Attacks on LLMs: How Adversaries Exploit AI Language Processing -
Hudson Rock
Infostealers Just Spawned a 5,000+ Repo GitHub Supply Chain Attack -
Hunt IO
Middle East Malicious Infrastructure Report: 1,350+ C2 Servers Mapped Across 98 Providers -
Huntress
-
IC3
“First VPN Service” Used by Ransomware Actors to Compromise Systems -
Dario Weiss, Manuel Feifel, and Olivier Becker at InfoGuard Labs
SeppMail Secure E-Mail Gateway: Critical RCE and LFI Vulnerabilities -
InfoSec Write-ups
-
Florian Bausch at Insinuator
Insights into Entra ID’s (Un)Conditional Access -
Invictus Incident Response
How to respond to an incident in Kubernetes | GKE | Invictus Incident Response -
Adam Goss at Kraven Security
Detection Engineering in 2026: The Complete Lifecycle (Sigma, YARA, DaC & AI) -
Lenny Zeltser
Six Signals for Threat Attribution -
LevelBlue SpiderLabs
-
Microsoft Security
- How Storm-2949 turned a compromised identity into a cloud-wide breach
- Exposing Fox Tempest: A malware-signing service operation
- Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft
- From edge appliance to enterprise compromise: Multi-stage Linux intrusion via F5 and Confluence
-
Mitiga
From Cloud Events to Attack Chains: Cloud Threat Hunting that Actually Works -
Natto Thoughts
Is This Chinese Company Watching the World to Train its AI? -
Hussein Bahmad at NVISO Labs
Securing AI systems without overconfidence or fear – Part 2: Attack surfaces and the checkpoint flow -
Oleg Skulkin at ‘Know Your Adversary’
393. Hunting for Recent Gamaredon Tactics, Techniques, and Procedures -
OpenSourceMalware
-
OSINT Team
The Detection Engineering Lifecycle in 2026 (Sigma, YARA, DaC & AI) -
OX Security
- New Actors Deploy Shai-Hulud Clones: TeamPCP Copycats Are Here
- Top 5 Runtime Security Tools for Application Runtime Protection in 2026
- The @antv Ecosystem Was Compromised with Shai-Hulud Malware, 300+ Packages Affected
- North Korean Threat Actor Targets Developers with New npm Infostealer RAT
- TeamPCP Strikes (again): How a Trojan VS Code Extension Brought Down GitHub
- Megalodon: New CI/CD Malware Spreads Across GitHub, Infecting ~5,000+ Repositories
-
Palo Alto Networks
-
Eric Iswara at Promon
Coretax RAT malware: A rising threat to banking security in Southeast Asia -
Push Security
-
Qi’anxin X Lab
-
ReliaQuest
-
Robin Dost at Synaptic Systems
-
SANS Internet Storm Center
-
Securelist
-
Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee at Securonix
Analyzing TAX#TRIDENT: Fake Indian Tax Lures Pivot Across ZIP, VBS, Stego and PHP-Wrapped VBS Delivery -
Phil Stokes at SentinelOne
SHub Reaper | macOS Stealer Spoofs Apple, Google, and Microsoft in a Single Attack Chain -
Socket
- Active Supply Chain Attack Compromises @antv Packages on npm
- Popular Go Decimal Library Targeted by Long-Running Typosquat with DNS Backdoor
- Coruna Respawned: Compromised art-template npm Package Leads to iOS Browser Exploit Kit
- npm Invalidates Granular Access Tokens as Mini Shai-Hulud Sweeps the Registry
- AI Has Taken Over Open Source
- Malicious Postinstall Hook Found Across 700+ GitHub Repositories, Including Packagist and Node.js Projects
- Laravel Lang Compromised with RCE Backdoor Across 700+ Versions
-
Sophos
-
Splunk
Detecting Copy Fail (CVE-2026-31431)– Phenominal Power, Ity Bity Script -
Dave Shackleford at Spur
When Good IPs Go Bad: Why Traditional Reputation-Based Detection Is Failing -
Step Security
- Nx Console VS Code Extension Compromised
- actions-cool/issues-helper GitHub Action Compromised: All Tags Point to Imposter Commit That Exfiltrates CI/CD Credentials
- Compromised atool npm Account Delivers CI/CD Credential Stealer Across 24 Packages (echarts-for-react package, timeago.js)
- Shai-Hulud: Here We Go Again. Mass npm Supply Chain Attack Hits the AntV Ecosystem
- Megalodon: Mass GitHub Actions Secret Exfiltration Across 5,500+ Public Repositories
- Laravel-Lang Supply Chain Attack: Every Tag Across Multiple Composer Packages Rewritten to Steal CI Secrets
-
Marco A. De Felice aka amvinfe at SuspectFile
Since When Did Asking for Evidence Become “Defending Criminals”? -
The Hunter’s Ledger
CVE-2026-41940 cPanel Harvester Toolkit — 216.126.227.49 -
The Raven File
-
ThreatMon
One Month. Hundreds of Victims. A Growing Ransomware Crisis -
Trend Micro
- Inside SHADOW-WATER-063’s Banana RAT: From Build Server to Banking Fraud
- TrendAI™ and CleanDNS: From Blocking Attacker Infrastructure to Removing It From the Internet
- One Man, One AI, One Fake Persona: Inside the 5-Year Influence and Fraud ‘Patriot Bait’ Campaign
- Analyzing Void Dokkaebi’s Cython-Compiled InvisibleFerret Malware
-
Nick Thanos at Triskele Labs
The Group That Didn’t Need to Break In: How KillSec3 Exploited What Was Already Exposed -
Umut Bayram at Picus Security
-
We Investigate Anything
-
WeLiveSecurity
-
Wiz
-
Taoufik El Adel at Wordfence
How a Webmail Log File Became a Root-Level Backdoor -
Matt McCabe at ZScaler
Data Leakage Through AI Prompts: 12 Realistic Examples (and Controls That Stop Them)
Upcoming events/webinars
-
ADF Solutions
-
Black Hills Information Security
-
Magnet Forensics
Mobile Unpacked S4:E5 // Millings on Modes – Exploring the other Modes of iOS and Android -
Security Onion
Security Onion Conference 2026 Save the Date and CFP -
Silent Push
Webinar – Beyond GeoIP: Stop Sanctioned-Region Logins, AML Fraud and Fake Hires. -
Simply Cyber
Cyber Threat Intel Skills
Presentations/podcasts
-
Adversary Universe Podcast
Adversaries Follow the Money: The CrowdStrike 2026 Financial Services Threat Landscape Report -
Black Hat
Black Hat Stories | Yaara Shriki, Threat Researcher at Wiz -
Cloud Security Podcast by Google
EP278 The Agentic SOC: Are We Measuring Time Saved or Risk Reduced? -
Cyber Secrets
-
FIRST
Episode 56: Mor Weinberger and Lior Kaplan, FIRSTCON26 Speakers -
Huntress
-
InfoSec_Bret
Challenge – Phantom Validation -
Magnet Forensics
-
Microsoft Threat Intelligence Podcast
Eviltokens: A Conversation with Huntress on an AI‑Enabled Device Code Phishing Campaign -
Monolith Forensics
-
MyDFIR
-
Off By One Security
Confused Deputies and Stolen Tokens: Breaking and Rebuilding MCP Auth with Brooks McMillin -
Parsing The Truth: One Byte at a Time Podcast
S2 E1: Season Two – Here we come! -
SANS Cyber Defense
Agentic AI Explained: How It Really Works, When It Fails, and What to Watch For -
SUMURI Forensics at Sumuri
How to update your RECON ITR | RECON ITR Deep Dive -
Team Cymru
The CVSS problem: why severity scores don’t predict what gets exploited
Malware analysis
-
Aikido
-
Joey Chen at Cisco’s Talos
From PDB strings to MaaS: Tracking a commodity BadIIS ecosystem used by Chinese-speaking threat -
Cleafy Labs
NFC Relay Goes Local: How AI Is Accelerating a New Wave of Independent Malware Developers -
Dark Atlas
PlugX DLL Sideloading via MSI Installer: Complete Malware Analysis of a KorPlug Campaign -
Yun Zheng Hu and Mick Koomen at Fox-IT
RemotePE: The Lazarus RAT that lives in memory -
Noufal Radhitya at Intellibron
Betting on Risk: An Analysis of Spyware Disguised as Online Gambling App -
Srinivasan E at K7 Labs
Fake Microsoft Teams Campaign Delivers ValleyRAT via NSIS Installer and DLL Sideloading -
Renaud Tabary at MALCAT
Benchmarking LLMs for malware triage and static unpacking with Malcat -
Dixit Panchal at Seqrite
Operation Dragon Whistle: UNG002 Targets Chinese Academia via Weaponized Institutional Lure -
Shubho57
Analysis of Vile Ransomware -
Snyk
-
Carlos Perez at TrustedSec
Shai-Hulud Is Back, and This Time It Ate the Whole Ecosystem
Miscellaneous
-
Lee Sult at Binalyze
Handala’s Kill List: Tracking the Victims of Iran’s Most Destructive Cyber Unit -
Brett Shavers
-
BushidoToken
UK Cybercrime Journal: Inside the Cl0p attack on South Staffs Water -
Cellebrite
-
Fabian Mendoza at DFIR Dominican
DFIR Jobs Update – 05/18/26 -
FIRST
-
Forensic Focus
- Finding Previous Locations Without Geolocation Data
- Digital Forensics Jobs Round-Up, May 18 2026
- How The City Of Johannesburg In South Africa Accelerated Investigations With Detego Technology
- The Cloud Attachment Problem: Why Modern Email Investigations Are Missing Critical Evidence
- On-Scene Digital Forensics: Winning Investigations Before The Lab
- Inside The Cellebrite Spring 2026 Release
- GMDSOFT Tech Letter Vol21.ChatGPT Q&A: 10 Key Questions
- Digital Forensics Round-Up, May 20 2026
- Detego Global Partners With National Foundation For Retired Service Animals To Support “Protect Our Protectors” Mission
- When The Job Comes Home: The Impact On Families
- Forensic Focus Digest, May 22 2026
-
Howard Oakley at ‘The Eclectic Light Company’
How QuickLook provides thumbnails and previews -
Kenneth G. Hartman at Lucid Truth Technologies
FaceTime Evidence Apple Subpoena: What Apple Actually Hands Over -
Magnet Forensics
-
Блог Solar 4RAYS
Боль реагирования: как процессы информационной безопасности влияют на расследование инцидента
Software releases/updates
-
Alexis Brignoni
-
Arkime
v6.4.0 -
Belkasoft
Belkasoft X 2.11: A Sneak Peak -
Canadian Centre for Cyber Security
Assemblyline 4.7.3.3 -
Daniel Benzano
RDPuzzle v0.1.2 -
Didier Stevens
Update: search-for-compression.py Version 0.0.7 -
Digital Sleuth
winfor-salt v2026.9.3 -
Doug Burks
ohmypcap v3.0.0 -
Erik Hjelmvik at Netresec
PolarProxy 2.0 Released -
Nextron Systems
Announcing the Release of ASGARD Management Center v4.0 -
OpenCTI
7.260522.0 -
Security Onion
Security Onion 3.1.0 Now Available with Elastic 9.3.3, Suricata 8.0.5, Zeek 8.0.8, and much more!
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!
Discover more from This Week In 4n6
Subscribe to get the latest posts sent to your email.