Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise Threat intelligence | Microsoft Security Blog
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise Threat intelligence | Microsoft Security Blog
ATT&CK v19: The Defense Evasion Split, ICS Sub-Techniques, New AI & Social Engineering Coverage… MITRE ATT&CK® - Medium
First Public macOS Kernel Exploit on Apple M5 Prepared Using Mythos Preview in Five Days Cyber Security News
Russian APT Chained Firefox and Windows Zero-Days Against US and European Targets Malware News > Packet Storm
LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises Anyrun
ANY.RUN & Elastic Security: Bring Threat Intelligence into Detection and Investigation Workflows Anyrun