Cookie-Controlled PHP Webshells Use HTTP Cookies and Scheduled Tasks to Maintain Low-Visibility Remote Code Execution on Linux Hosting Environments Cookie-Controlled PHP Webshells Use HTTP Cookies ...
#TIGR #malware
Origin | Interest | Match
🚩 TeamPCP Weaponizes Security Tools in Multi-Stage Supply Chain Attack Targeting CI/CD and Cloud Infrastructure TeamPCP supply chain attack compromises security tools (Trivy, KICS, LiteLLM), ste...
#TIGR #malware
Origin | Interest | Match
🚩 Axios npm Package Compromise Delivers Cross-Platform RAT Through Malicious Dependency Injection axios npm compromise delivers cross-platform RAT via malicious dependency. The post 🚩 Axios n...
#TIGR #malware
Origin | Interest | Match
🚨 Institutions #optionsvolume surge detected! PM Top Momentum Activity from 🔥 INSIDERFINANCE.COM
🚨 Institutions #optionsvolume surge detected!
PM Top Momentum Activity from 🔥 INSIDERFINANCE.COM 🔥
1. #ESTC 9.4x
2. #SNAP 6.8x
3. #TIGR 4.3x
4. #NNDM 4.3x
5. #META 3.9x
#OptionFlow #OptionsTrading #Trading
🎯 Momentum #Options Activity trade ideas! Heavy institutional #optionsvolume far above daily averag
🎯 Momentum #Options Activity trade ideas! Heavy institutional #optionsvolume far above daily average with strong consensus on direction.
PM Algo #TradeIdea from 🔥 INSIDERFINANCE.COM 🔥
#ESTC, #TIGR, #NNDM, #COHR, #UAL
#OptionFlow #OptionsTrading #Trading
🚩 LiteLLM PyPI Supply Chain Attack Exfiltrates Cloud Credentials and Cryptocurrency Wallets via Compromised Maintainer Account LiteLLM PyPI supply chain attack via compromised maintainer account...
#TIGR #Unknown
Origin | Interest | Match
Cisco Talos Introduces Exfiltration Framework to Combat Ransomware Abuse of Legitimate Tools Cisco Talos Introduces Exfiltration Framework to Combat Ransomware Abuse of Legitimate Tools The post Ci...
#TIGR #ransomware
Origin | Interest | Match
🚩 Perseus Android Malware Targets Note-Taking Apps to Harvest Passwords and Crypto Keys New Android malware "Perseus" scans note apps for passwords and crypto recovery keys. #AndroidSecu...
#TIGR #malware
Origin | Interest | Match
#TIGR UP Fintech: Record Full-Year Revenue and Profit; Full-Year Profit Surges 165% YoY; Global Client Assets Reach US$60.8 Billion
www.stocktitan.net/news/TIGR/up-fintech-rec...
#TIGR UP Fintech Holding Limited Reports Unaudited Fourth Quarter And Full Year 2025 Financial Results
www.stocktitan.net/news/TIGR/up-fintech-hol...
🚩 Konni APT Group Exploits Spear-Phishing and KakaoTalk to Deploy Multi-Stage RAT Campaign #NorthKorea linked Konni APT using fake emails to install #malware then hijacking victims' #KakaoTa...
#TIGR #malware #phishing
Origin | Interest | Match
🚩 Sophos Reports Evolving ClickFix Campaigns Targeting macOS Users with MacSync Infostealer Variants Sophos Reports Evolving ClickFix Campaigns Targeting macOS Users with MacSync Infostealer Var...
#TIGR #phishing
Origin | Interest | Match
🚩 ANY.RUN Details MicroStealer, a Fast-Spreading Infostealer Utilizing NSIS, Electron, and Java to Evade Detection ANY.RUN Details MicroStealer, a Fast-Spreading Infostealer Utilizing NSIS, Elec...
#TIGR #malware
Origin | Interest | Match
🚩 IBM X-Force reports Hive0163 used a likely AI-generated PowerShell backdoor during an Interlock ransomware intrusion. IBM X-Force reports Hive0163 used a likely AI-generated PowerShell backdoo...
#TIGR #malware #ransomware
Origin | Interest | Match
🚩 ANY.RUN Reports Surge in OAuth Device Code Phishing for Token-Based Microsoft 365 Account Takeovers ANY.RUN Reports Surge in OAuth Device Code Phishing for Token-Based Microsoft 365 Account Ta...
#TIGR #phishing
Origin | Interest | Match
Comprehensive Overview of Iranian State-Sponsored Threat Actors and Their Evolving Tactics Comprehensive Overview of Iranian State-Sponsored Threat Actors and Their Evolving Tactics The post Compre...
#TIGR #nation #state
Origin | Interest | Match
“Contagious Interview” Campaign Weapons Developer Hiring Workflows to Deploy Modular Backdoors "Contagious Interview" Campaign Weapons Developer Hiring Workflows to Deploy Modular Backd...
#TIGR #malware #phishing
Origin | Interest | Match
Google Cloud Threat Horizons Report Highlights Rapid Exploitation Timelines and CI/CD Abuse Google Cloud Threat Horizons Report Highlights Rapid Exploitation Timelines and CI/CD Abuse The post Goog...
#TIGR #cybercriminal #data #breach
Origin | Interest | Match
Threat Actors Exploit Salesforce Experience Cloud Guest User Misconfigurations Using Modified Aura Inspector Threat Actors Exploit Salesforce Experience Cloud Guest User Misconfigurations Using Mod...
#TIGR #cybercriminal
Origin | Interest | Match
🚩 Cisco Talos Discovers China-Nexus APT UAT-9244 Targeting South American Telecoms with Novel Malware Implants Cisco Talos Discovers China-Nexus APT UAT-9244 Targeting South American Telecoms wi...
#TIGR #Uncategorized #nation #state
Origin | Interest | Match
🚩 Microsoft Identifies a Developer-Targeting Campaign Utilizing Malicious Next.js Repositories Disguised as Job Assessments to Achieve Remote Code Execution Microsoft Identifies a Developer-Targ...
#TIGR #malware
Origin | Interest | Match
🚩 StegaBin Campaign Deploys 26 Malicious npm Packages Using Pastebin Steganography and Nine-Module Infostealer 26 malicious npm packages use Pastebin steganography hiding C2 in fake essays. Nort...
#TIGR #malware
Origin | Interest | Match
🚩 Four Malicious NuGet Packages Deploy JIT Hooking and Localhost Proxy to Exfiltrate ASP[.]NET Credentials Four malicious NuGet packages use JIT hooking and localhost proxy to steal ASP credenti...
#TIGR #malware
Origin | Interest | Match
Recorded Future Highlights Expanding Cloud Attack Patterns Centered on Credential Abuse, Misconfiguration, Native Service Abuse, and AI Service Targeting Recorded Future Highlights Expanding Cloud ...
#TIGR #Unknown
Origin | Interest | Match
Splunk Releases February 2026 Security Content Update Providing New Detections for AI-Abusing Malware, npm Supply Chain Worms, and Critical Vulnerabilities Splunk Releases February 2026 Security Co...
#TIGR #Unknown
Origin | Interest | Match
🚩 UNC6201 Exploits Critical Dell RecoverPoint VM Zero-Day to Deploy GRIMBOLT Backdoor UNC6201 exploited CVE-2026-22769 (CVSS 10.0) in #Dell #RecoverPoint for VMs to deploy GRIMBOLT, per #Mandian...
#TIGR #vulnerability
Origin | Interest | Match
🚩 Keenadu Backdoor Embeds in Android Firmware Through Supply Chain Compromise Linking Major Botnets Keenadu firmware backdoor compromises Android devices via supply chain attack. Links Triada, B...
#TIGR #malware
Origin | Interest | Match
🚩Asia-Based Cyberespionage Group Expands Global Campaign Against Government and Critical Infrastructure Asia-based cyberespionage group #TGR-STA-1030 compromised 70 government entities across 37...
#TIGR #espionage #malware #nation #state
Origin | Interest | Match
🚩UAT-8099 Expands IIS SEO Fraud Campaign with Regionalized BadIIS Variants and New Persistence Techniques UAT-8099 Expands IIS SEO Fraud Campaign with Regionalized BadIIS Variants and New Persis...
#TIGR #cybercriminal #malware
Origin | Interest | Match
Ivanti discloses active analysis guidance for Ivanti Endpoint Manager Mobile RCE vulnerabilities CVE-2026-1281 and CVE-2026-1340 #Ivanti patches two #zeroday vulns affecting #EPMM The post Ivanti d...
#TIGR #vulnerability
Origin | Interest | Match