India's sovereign platform for aggregating and disseminating cyber threat intelligence.
https://ctigrid.arpsyndicate.io
https://ctigrid.arpsyndicate.io
SlowMist Researchers dive deep into the Lockbit Breach.
https://slowmist.medium.com/when-hackers-get-hacked-analyzing-the-breach-of-lockbit-23b8f553747d
https://slowmist.medium.com/when-hackers-get-hacked-analyzing-the-breach-of-lockbit-23b8f553747d
Medium
When Hackers Get Hacked: Analyzing the Breach of LockBit
LockBit’s leaked database exposed BTC addresses, private keys, chat logs, and linked companies.
Anonymous Poll
56%
YES 😈
44%
NO 🙅♂
Ben Folland explores how defenders can exploit flaws in Telegram-based malware to disrupt C2 communications subsequently revealing insights into their backend infrastructure and other cybercrime activities.
https://polygonben.github.io/malware%20analysis/Compromising-Threat-Actor-Communications/
https://polygonben.github.io/malware%20analysis/Compromising-Threat-Actor-Communications/
Polygonben
Compromising Threat Actor Communications
Traditionally, the vast majority of malware would communicate to a threat actor owned server via a threat actor owned domain or IP address. This domain or IP would likely be hardcoded within the malware sample somewhere, such that when executed, it would…
U.S. is investigating hidden communication tech in Chinese solar and battery equipment while pushing for trusted gear in its power grid.
https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/
https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/
Reuters
Rogue communication devices found in Chinese solar power inverters
U.S. energy officials are reassessing the risk posed by Chinese-made devices that play a critical role in renewable energy infrastructure after unexplained communication equipment was found inside some of them, two people familiar with the matter said.
OpenBullet 2 is a popular tool among attackers for credential-stuffing attacks, offering features like proxy support and CAPTCHA farm integration. Its user-friendly interface and availability of pre-made LoliScript configurations make it accessible even to non-developers.
https://blog.castle.io/open-bullet-2-fraudsters-preferred-credential-stuffing-tool-2/
https://blog.castle.io/open-bullet-2-fraudsters-preferred-credential-stuffing-tool-2/
The Castle blog
Open Bullet 2: The preferred credential stuffing tool for bots
Open Bullet 2 is an open-source software, specialized in credential stuffing attacks, i.e. attacks that use bots to automatically steal user accounts at scale by automatically testing stolen credentials found in data breaches. It can target both websites…
❤1
In 2017, Qihoo 360 founder Zhou Hongyi criticized Chinese experts joining foreign hackathons, urging that discovered vulnerabilities stay within China. His stance aligned with national policy, as domestic competitions now require reporting all findings to the government.
https://youtu.be/8kpnSb4yGR0
https://www.bloomberg.com/news/articles/2025-04-30/chinese-hacking-competitions-fuel-the-country-s-broad-cyber-ambitions
https://youtu.be/8kpnSb4yGR0
https://www.bloomberg.com/news/articles/2025-04-30/chinese-hacking-competitions-fuel-the-country-s-broad-cyber-ambitions
Bloomberg.com
Chinese Hacking Competitions Fuel the Country’s Broad Cyber Ambitions
Participants are required to turn findings over to the Chinese government.
🚨 Stay ahead with real-time CVE scoring updates!
Track daily changes in EPSS & VEDAS at:
👉 https://vedas.arpsyndicate.io
We also push bulk updates to GitHub:
📈 https://github.com/ARPSyndicate/cve-scores
Need deeper CVE insights?
Try our enrichment API:
🔍 https://api.exploit.observer/?keyword=CVE-2025-32370&enrich=True
Track daily changes in EPSS & VEDAS at:
👉 https://vedas.arpsyndicate.io
We also push bulk updates to GitHub:
📈 https://github.com/ARPSyndicate/cve-scores
Need deeper CVE insights?
Try our enrichment API:
🔍 https://api.exploit.observer/?keyword=CVE-2025-32370&enrich=True
VEDAS Scores for CVEs (https://github.com/ARPSyndicate/cve-scores) is a more reliable, capable, and intelligence-driven alternative to EPSS.
LinkedIn Post: https://www.linkedin.com/posts/glatisant_vulnerability-vulnintel-vulnrichment-activity-7331612428687884288-BIDG
LinkedIn Post: https://www.linkedin.com/posts/glatisant_vulnerability-vulnintel-vulnrichment-activity-7331612428687884288-BIDG
Sean Heelan discovered a critical zero-day vulnerability, CVE-2025-37899 in the Linux kernel's ksmbd module using OpenAI's o3 language model. This marks one of the first instances where a large language model has independently identified a complex kernel-level security flaw.
https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/
https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/
Sean Heelan's Blog
How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
In this post I’ll show you how I found a zeroday vulnerability in the Linux kernel using OpenAI’s o3 model. I found the vulnerability with nothing more complicated than the o3 API ̵…
Trending CVEs on 28/5/25:
CVE-2024-13946 / ABB Cylon / Binary Planting
CVE-2025-2636 / Wordpress / Local File Inclusion
CVE-2025-24118 / MacOS / Race Condition
CVE-2025-32756 / Fortinet / Stack Overflow
Learn More:
https://vedas.arpsyndicate.io
CVE-2024-13946 / ABB Cylon / Binary Planting
CVE-2025-2636 / Wordpress / Local File Inclusion
CVE-2025-24118 / MacOS / Race Condition
CVE-2025-32756 / Fortinet / Stack Overflow
Learn More:
https://vedas.arpsyndicate.io
In late October 2024, GTIG identified a compromised government website being used to distribute malware targeting multiple other government organizations. This site delivered a malware strain named TOUGHPROGRESS which utilized Google Calendar as a command and control (C2) mechanism.
https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics
https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics
Google Cloud Blog
Mark Your Calendar: APT41 Innovative Tactics | Google Cloud Blog
❤1
Trending CVEs on 29/5/25:
CVE-2021-43883 / Microsoft Windows / Privilege Escalation
CVE-2023-38879 / openSIS / Path Traversal
CVE-2024-51211 / openSIS / SQL Injection
CVE-2025-46176 / D-Link / Hardcoded Credentials
Learn More:
https://vedas.arpsyndicate.io
CVE-2021-43883 / Microsoft Windows / Privilege Escalation
CVE-2023-38879 / openSIS / Path Traversal
CVE-2024-51211 / openSIS / SQL Injection
CVE-2025-46176 / D-Link / Hardcoded Credentials
Learn More:
https://vedas.arpsyndicate.io