ARPSyndicate - Cyber & Open Source Intelligence
447 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
Check Point Research is tracking a sophisticated phishing campaign by APT29 (Cozy Bear), a Russia-linked group targeting European diplomatic entities. The attackers impersonate a European foreign affairs ministry to send fake event invites, often for wine tastings.

They use a new initial-stage loader, GRAPELOADER, and an upgraded version of their previous backdoor, WINELOADER. GRAPELOADER handles initial access and stealth, while WINELOADER operates in later stages.

Both share technical similarities, but GRAPELOADER enhances anti-analysis and stealth capabilities.

https://research.checkpoint.com/2025/apt29-phishing-campaign/
Bob Lord, Senior Technical Advisor at the Cybersecurity and Infrastructure Security Agency (CISA), announced his departure from the agency.
Sharon Brizinov earned $64k in bug bounties by automating the scanning of public GitHub repositories for leaked secrets. He restored deleted files, found dangling blobs, and unpacked .pack files to uncover exposed API keys, tokens, and credentials.

https://medium.com/@sharon.brizinov/how-i-made-64k-from-deleted-files-a-bug-bounty-story-c5bd3a6f5f9b
"In one practice firing test, we found that if the rate of the fire of the gun crossed a certain threshold, that gun got blocked. There was a chip in that that during a war it will stop a gun from firing...... Any small impact on hardware or software can definitely lead to a military defect." — Lt. General (Dr.) Rajesh Pant

https://www.youtube.com/watch?v=iEqs1Wgt_Fo
Few European countries, notably France, Spain, and Portugal, experienced major power outages that impacted millions. Although the exact cause is still being investigated by authorities, there are reports and speculation pointing to possible involvement by cybercriminals.

https://www.politico.eu/article/spain-portugal-power-blackouts-energy-electricity/
Docker remains the top target among services trapped by Darktrace honeypots, consistently drawing attacks from emerging malware strains. This blog delves into a recent campaign with an unusual obfuscation method and an innovative cryptojacking technique.

https://www.darktrace.com/blog/obfuscation-overdrive-next-gen-cryptojacking-with-layers
Puncia v0.32 is out! 🎉
Boost your cyber intelligence game with:

🌐 Attack surface mapping
🔍 Exploit discovery
⚙️ CVE/GHSA enrichment
🤖 Summarization & code gen
✍️ Auto advisory creation
🧾 SBOM analysis
🔄 CI/CD & threat intel integration
🛰️ Nation-state threat tracking
🛡️ Brand protection
📦 Bulk threat intel processing
🕵️ Passive recon & OSINT
📰 Auto-summarized security blogs
🌍 Multilingual intel delivery

https://github.com/ARPSyndicate/puncia
ARPSyndicate - Cyber & Open Source Intelligence pinned «Puncia v0.32 is out! 🎉 Boost your cyber intelligence game with: 🌐 Attack surface mapping 🔍 Exploit discovery ⚙️ CVE/GHSA enrichment 🤖 Summarization & code gen ✍️ Auto advisory creation 🧾 SBOM analysis 🔄 CI/CD & threat intel integration 🛰️ Nation-state threat…»
A hacker has stolen customer data from TeleMessage, an obscure Israeli company that sells modified messaging apps to the U.S. government. The breach includes messages from its versions of Signal, WhatsApp, Telegram, and WeChat. TeleMessage recently gained attention after Mike Waltz revealed he used it in a meeting with Trump.

https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/