Tagged articles
28 articles
Page 1 of 1
Black & White Path
Black & White Path
May 19, 2026 · Information Security

Dark Web Claim of a 62 GB OpenAI Data Leak: What’s Inside?

A threat actor named MrLucxy is selling a purported "OpenAI dataset" on the dark web, claiming a compressed size of about 14.6 GB and over 62 GB uncompressed, containing chat logs, Slack exports, internal tickets, infrastructure SQL dumps, contractor PII, API key files, and monitoring data, but a veteran security analyst doubts its authenticity, noting the unusually large 8 MB API‑key file and suggesting it may be repackaged old leaks or fabricated data, as reported by Undercode News.

OpenAIdark webdata leak
0 likes · 2 min read
Dark Web Claim of a 62 GB OpenAI Data Leak: What’s Inside?
Black & White Path
Black & White Path
May 13, 2026 · Information Security

AI‑Powered 0‑Day Discovery: How Attackers Autonomously Bypassed 2FA

In May 2026, Google Threat Intelligence disclosed that a cybercrime group used a large‑language model to autonomously identify a semantic‑logic flaw in a popular open‑source Python‑based web management tool, generate a Python exploit that bypasses its two‑factor authentication, and launch mass automated attacks, prompting new blue‑team detection and defense strategies.

0-day2FA bypassAI security
0 likes · 12 min read
AI‑Powered 0‑Day Discovery: How Attackers Autonomously Bypassed 2FA
Black & White Path
Black & White Path
May 11, 2026 · Information Security

FFBT Hit Again: Credential and Admin Access Data Breach by NormalLeVrai

In May 2026, VECERT flagged threat actor NormalLeVrai for stealing credentials and admin access from France’s Fédération Française de Ball‑Trap (FFBT), selling the data on dark‑web markets; the breach, still under investigation, highlights the actor’s focus on French organizations, low‑price bulk sales, and the need for immediate password resets, MFA, and continuous monitoring.

FFBTNormalLeVraicredential theft
0 likes · 6 min read
FFBT Hit Again: Credential and Admin Access Data Breach by NormalLeVrai
Black & White Path
Black & White Path
Apr 17, 2026 · Information Security

Threat Alert: Cloud‑Native Cybercrime Group TeamPCP Targets Docker, Kubernetes, and Redis

TeamPCP, a newly identified cloud‑native threat group, has compromised at least 60,000 servers worldwide by exploiting exposed Docker APIs, Kubernetes clusters, Redis instances, and the React2Shell vulnerability, employing automated tools such as proxy.sh, kube.py, and react.py, with detailed MITRE ATT&CK mapping and concrete defense recommendations.

DockerKubernetesMITRE ATT&CK
0 likes · 16 min read
Threat Alert: Cloud‑Native Cybercrime Group TeamPCP Targets Docker, Kubernetes, and Redis
Black & White Path
Black & White Path
Apr 7, 2026 · Information Security

Ransomware ‘Shaming’ Attacks Surge: Over 2,000 Companies Exposed in 2026

Ransomware groups are increasingly using double‑extortion "shaming" tactics, publicly leaking stolen data to pressure victims, with Breachsense reporting more than 2,000 compromised firms in 2026, a 40% rise projected for the year, prompting new defensive strategies across industries.

cybersecuritydata breachdouble extortion
0 likes · 10 min read
Ransomware ‘Shaming’ Attacks Surge: Over 2,000 Companies Exposed in 2026
Black & White Path
Black & White Path
Mar 2, 2026 · Information Security

When Missiles Fall, Cyber Attack Countdown Starts: Iran’s Escalating Threat

As U.S. and Israeli forces target Iranian nuclear sites, analysts warn that Iran and its proxy hackers are poised to launch large‑scale cyber retaliation against critical U.S. and Israeli infrastructure, with sophisticated APT groups, upgraded attack methods, and high‑risk targets spanning energy, finance, and public utilities.

APTCyber WarfareDefense Strategies
0 likes · 9 min read
When Missiles Fall, Cyber Attack Countdown Starts: Iran’s Escalating Threat
Black & White Path
Black & White Path
Feb 27, 2026 · Information Security

Hackers Pipeline FortiGate Attacks with DeepSeek and Claude; OpenClaw Compromises 30,000 Instances

Researchers discovered that threat actors have automated large‑scale FortiGate compromises by feeding reconnaissance data into DeepSeek and Claude, building a continuous attack pipeline, while a separate AI‑Agent framework, OpenClaw, was weaponized within 72 hours to hijack over 30,000 instances, exposing critical design flaws and prompting urgent mitigation guidance.

FortiGateOpenClawai
0 likes · 13 min read
Hackers Pipeline FortiGate Attacks with DeepSeek and Claude; OpenClaw Compromises 30,000 Instances
Black & White Path
Black & White Path
Feb 17, 2026 · Information Security

AI-Generated Malware Exploits React2Shell to Attack Docker: A Low‑Barrier Threat Surge

A Darktrace‑detected campaign shows AI‑generated malware leveraging the React2Shell vulnerability to compromise an intentionally exposed Docker daemon, download LLM‑crafted payloads, and install XMRig mining software, highlighting a new low‑skill threat vector that evades traditional signature defenses.

AI-generated malwareDockerLLM
0 likes · 5 min read
AI-Generated Malware Exploits React2Shell to Attack Docker: A Low‑Barrier Threat Surge
Black & White Path
Black & White Path
Feb 14, 2026 · Information Security

When Hackers Operate Like a Corporation: How Attackers Outpace Defenders

The article traces the rapid evolution of cybercrime from scattered early malware to a highly organized, global underground industry, highlighting the rise of Ransomware‑as‑a‑Service, state‑backed actors, AI‑driven attacks, and why enterprises must shift from slow, reactive defenses to proactive resilience.

AI in securityattack-as-a-servicecyber resilience
0 likes · 13 min read
When Hackers Operate Like a Corporation: How Attackers Outpace Defenders
Black & White Path
Black & White Path
Feb 13, 2026 · Information Security

Why AI-Powered Attack Toolkits Are Inevitable, Says Google Security Exec

Google senior security leaders warn that attackers are already using AI for tasks like phishing and data‑theft command generation, and that fully automated, end‑to‑end AI attack kits are only a matter of time, forcing defenders to rethink protection strategies.

AI securityAI-driven attackscloud security
0 likes · 6 min read
Why AI-Powered Attack Toolkits Are Inevitable, Says Google Security Exec
Black & White Path
Black & White Path
Feb 11, 2026 · Information Security

OpenClaw Teams with Google VirusTotal to Tackle AI Agent and Skill Security

OpenClaw has partnered with Google’s VirusTotal to automatically scan every AI Agent Skill on its ClawHub marketplace, using threat‑intelligence hashes and Gemini‑powered behavior analysis to block malicious code, flag suspicious content, and establish a deeper security baseline for the emerging AI Agent ecosystem.

AI AgentAutomated Security ScanningCode Insight
0 likes · 5 min read
OpenClaw Teams with Google VirusTotal to Tackle AI Agent and Skill Security
Tencent Technical Engineering
Tencent Technical Engineering
Sep 22, 2025 · Information Security

Inside the RapperBot DDoS Botnet: Anatomy, Attack Tactics, and Defense Strategies

An in‑depth investigation reveals the rise and takedown of the RapperBot DDoS botnet, detailing its malware lineage, sample analysis, sophisticated attack techniques, criminal profit models, and practical security recommendations, while showcasing Tencent’s Zeus Shield intelligence platform and AI‑enhanced threat analysis.

BotnetDDoScybersecurity
0 likes · 11 min read
Inside the RapperBot DDoS Botnet: Anatomy, Attack Tactics, and Defense Strategies
Swan Home Tech Team
Swan Home Tech Team
Jul 21, 2025 · Information Security

Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies

This article dissects modern phishing and ransomware threats, detailing preparation, bait construction, email header spoofing, and open‑source tools like Gophish, then outlines comprehensive defensive measures—from endpoint security and threat intelligence to risk‑based response economics—offering a systematic, technology‑to‑tactics‑to‑strategy framework for information security teams.

Gophishinformation securityphishing
0 likes · 15 min read
Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies
Architects' Tech Alliance
Architects' Tech Alliance
Mar 3, 2025 · Industry Insights

Why Global Cyber Attacks Jumped 44% in 2025: Key Findings from Check Point’s Security Report

Check Point’s 2025 cybersecurity report, based on data from 170 countries, reveals a 44% surge in global attacks, rapid ransomware evolution, massive exploitation of edge devices, a 96% reuse of known vulnerabilities, and highlights urgent recommendations for CISOs to strengthen BYOD, patch management, and incident response.

BYODCISOIndustry Report
0 likes · 5 min read
Why Global Cyber Attacks Jumped 44% in 2025: Key Findings from Check Point’s Security Report
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Oct 30, 2023 · Information Security

Building Effective Bot Management: Strategies, Architecture, and Best Practices

This article provides a comprehensive analysis of bot management, covering bot definitions, classification, current traffic trends, major vendor solutions, a four‑layer architecture, feature engineering, rule management, event operations, detection techniques, and practical steps for implementing a robust bot defense system.

B2B SecurityBot ManagementTraffic analysis
0 likes · 14 min read
Building Effective Bot Management: Strategies, Architecture, and Best Practices
Bilibili Tech
Bilibili Tech
Jan 17, 2023 · Information Security

Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures

The article delivers a technical overview of modern botnet threats, detailing the PBot and Xanthe families, their infection vectors, command‑and‑control operations, and provides practical detection, mitigation, and statistical analysis methods for defending against large‑scale DDoS, spam, and other malicious activities.

BotnetDetectionSuricata
0 likes · 17 min read
Botnet Threat Analysis and Detection Strategies: PBot, Xanthe and Countermeasures
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2022 · Information Security

Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report

The 2022 H1 Radware report reveals a 203% rise in malicious DDoS attacks, a shift from pandemic‑related threats to patriotic hacker activity driven by the Russia‑Ukraine conflict, record‑size attacks, resurging RDoS ransomware, and retail and high‑tech sectors emerging as top targets.

2022 trendsDDoSnetwork attacks
0 likes · 5 min read
Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report
Programmer DD
Programmer DD
Feb 23, 2022 · Information Security

Navicat Premium Compromised: Detect the Threat and Choose Safer Database Tools

A recent threat intelligence report reveals that Navicat Premium has been poisoned via a cracked version distributed from www.macwk.com, prompting users to urgently check for infections, change database passwords, and consider safer alternatives like Sequel Pro or IntelliJ IDEA's built‑in database client.

Alternative ToolsDatabase ToolsNavicat
0 likes · 5 min read
Navicat Premium Compromised: Detect the Threat and Choose Safer Database Tools
Java Architect Essentials
Java Architect Essentials
Jun 14, 2021 · Information Security

How the Qike PDF Converter Turns PCs into Botnets: Malware Analysis and Prevention

Huorong’s threat intelligence team discovered that the Qike PDF Converter carries a malicious proxy module that silently spreads via download‑site installers, hijacks system processes, persists as a startup service, and can turn infected machines into high‑CPU‑usage botnets, prompting immediate security updates.

BotnetHuorongPersistence
0 likes · 5 min read
How the Qike PDF Converter Turns PCs into Botnets: Malware Analysis and Prevention
Top Architect
Top Architect
Mar 9, 2021 · Information Security

Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion

This report provides a comprehensive technical analysis of the malicious "Le Bao" app that masquerades as a WeChat‑like chat tool, detailing its sample characteristics, hidden QR‑code group joining mechanism, payment flow, server‑side tracing, and profit model, highlighting its covert distribution of pornographic content and associated illicit activities.

information securitymalware analysispayment tracing
0 likes · 12 min read
Analysis of the ‘Le Bao’ Fraudulent Chat Application Used for Pornographic Promotion
Efficient Ops
Efficient Ops
May 26, 2020 · Information Security

5 Correlation Analysis Models Every Security Engineer Should Know

This article explores five primary correlation analysis models—rule‑based, statistical, threat‑intelligence‑based, context‑based, and big‑data‑driven—detailing their principles, typical use cases such as single‑log alerts, event‑count thresholds, multi‑value detections, temporal sequences, and how accurate log parsing underpins effective security analytics.

Statistical Modelingcorrelation analysisrule-based detection
0 likes · 15 min read
5 Correlation Analysis Models Every Security Engineer Should Know
360 Tech Engineering
360 Tech Engineering
Jun 14, 2019 · Information Security

A Guide to Producing Threat Intelligence from a Security Analysis Perspective

This article explains how threat intelligence is generated by defining it as judged security information, outlines methods for collecting and evaluating security data, introduces a two‑dimensional reliability/quality rating system, and provides a step‑by‑step engineering workflow for enterprise threat‑intelligence operations.

information collectionmachine learningrisk assessment
0 likes · 10 min read
A Guide to Producing Threat Intelligence from a Security Analysis Perspective
Efficient Ops
Efficient Ops
Apr 23, 2019 · Information Security

How Situational Awareness Transforms Modern Cybersecurity Defense

The article explains how situational awareness—covering pre‑attack, during‑attack, and post‑attack stages—leverages big data, AI, threat intelligence, UEBA and visualization to turn security platforms into proactive “security brains,” while also critiquing current product implementations and market practices.

Big DataUEBAcybersecurity
0 likes · 14 min read
How Situational Awareness Transforms Modern Cybersecurity Defense
JD Tech
JD Tech
Feb 19, 2019 · Information Security

Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security

The article explains what threat intelligence is, classifies it into strategic, tactical, and operational categories, illustrates its critical role in modern cyber‑warfare and e‑commerce defense, and discusses the challenges of timeliness, accuracy, and sharing within the security ecosystem.

e-commerce securityinformation securityoperational intelligence
0 likes · 8 min read
Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security
Efficient Ops
Efficient Ops
Dec 18, 2018 · Information Security

How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread

On December 14, Tencent's security intelligence team uncovered a “DriverLife” Trojan that exploited the high‑severity EternalBlue vulnerability to propagate like a worm, infecting up to 100,000 users within two hours, and detailed its infection chain, malicious payloads, and mitigation recommendations.

EternalBlueinformation securitymalware analysis
0 likes · 7 min read
How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread