Category: VendorResearch

New threat actor, UAT-9921, leverages VoidLink framework in campaigns
08
Mar
2026

New threat actor, UAT-9921, leverages VoidLink framework in campaigns

Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in campaigns. Their activities may go as far back…

Fuzzing a single thread to uncover vulnerabilities
08
Mar
2026

Fuzzing a single thread to uncover vulnerabilities

A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out Protection (RDP) on the Socomec DIRIS M-70 gateway by pivoting…

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel
08
Mar
2026

Beyond Hamas: Militant and Terrorist Groups Involved in the October 7 Attack on Israel

October 7: Hamas attacks Israel In the midst of the Israel-Hamas War, which erupted with a surprising and devastating attack…

Threat modeling AI applications | Microsoft Security Blog
08
Mar
2026

Threat modeling AI applications | Microsoft Security Blog

Proactively identifying, assessing, and addressing risk in AI systems We cannot anticipate every misuse or emergent behavior in AI systems….

Malicious AI Assistant Extensions Harvest LLM Chat Histories
08
Mar
2026

Malicious AI Assistant Extensions Harvest LLM Chat Histories

Microsoft Defender has been investigating reports of malicious Chromium‑based browser extensions that impersonate legitimate AI assistant tools to harvest LLM…

New Dohdoor malware campaign targets education and health care
08
Mar
2026

New Dohdoor malware campaign targets education and health care

Cisco Talos discovered an ongoing malicious campaign since at least as early as December 2025 by a threat actor we track as “UAT-10027,” delivering a previously undisclosed backdoor dubbed…

Matt Kapko
08
Mar
2026

Global coalition dismantles Tycoon 2FA phishing kit

Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle…

VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
08
Mar
2026

VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun

Key Points Check Point Research (CPR) believes a new era of AI-generated malware has begun. VoidLink stands as the first…

Flashpoint’s Threat Intelligence Capability Assessment
08
Mar
2026

Flashpoint’s Threat Intelligence Capability Assessment

Many organizations today have some form of threat intelligence. Far fewer have a threat intelligence function that is structured, measurable,…

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
08
Mar
2026

Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East

Key Findings During the ongoing conflict, we identified intensified targeting of IP cameras from two manufacturers starting on February 28,…

Patch, track, repeat: The 2025 CVE retrospective
08
Mar
2026

Patch, track, repeat: The 2025 CVE retrospective

Welcome to this week’s edition of the Threat Source newsletter. It’s time to look back at a year that pushed the…

The image shows a settings window for MMXPAGER TAP/SMS configuration. It includes checkboxes and fields for enabling TAP log file, TAP and SMS dialogs, acknowledgments, ANSI Modem, and SMS Unicode. There are input fields for SNPP server host name, port (set to 444), SNPP protocol level, pin, and password. There's also a dropdown menu option to allow shutdown.
08
Mar
2026

Privileged File System Vulnerability Present in a SCADA System

Executive Summary This report details a vulnerability we found in the Iconics Suite, tracked as CVE-2025-0921 with a Medium CVSS…