Threat Intelligence Bulletin – Container Files, Bots, and Industrial Espionage

In response to Microsoft plans to block macros by default, threat actors changing TTPs to container files (ISO, RAR) and Windows shortcut files (LNK)


Cisco releases patches for vulnerabilities affecting Nexus Dashboard for data centers


Overview of new Linux malware “Lightning Framework”, contains breadth of features and modularity


Info-stealing malware Amadey being installed through backdoor disguised as cracked software, can bypass Sophos and Windows Defender


Threat actors increasingly using Internet Information Services (IIS) extensions to backdoor servers and establish persistence


Hardcoded Atlassian Questions for Confluence app password leaked, likely to lead to exploit attempts


Researchers detail how Telegram and Discord, along with their associated bots, cloud infrastructure, and CDNs are being used for attacks


Microsoft takes top spot as most impersonated brand in phishing attacks


Overview, IOCs, and whitepaper of an industrial espionage attack