Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
    • Tools
    • Cheat Sheet
    • Security Guides
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Resources
  • Tools
  • Cheat Sheet
  • Security Guides
  • Contact
  • About
← All tags Tag

Threat Intelligence

30 articles

$10 Million Ransom, Four Days of Peace, and Then the Login Page Changed

ShinyHunters breached Canvas LMS, stole 275 million students' data, took the ransom — and attacked again four days later. Here's who they are and why arrests haven't stopped them.

15 May 2026
Threat Intelligence Cybersecurity Blue Team

Unmasking TeamPCP: The Supply Chain Saboteurs and the Trails They Left Behind

TeamPCP has compromised hundreds of open-source packages and stolen half a million credentials. But their OPSEC is leaking — and someone is already hunting them.

15 May 2026
Threat Intelligence Supply Chain Attribution

500 Microsoft CVEs Later — We're Still Measuring Security Wrong

Microsoft patched 500+ vulnerabilities in five months. Linux ecosystems patched even more. So which is more secure? That's the wrong question — here's the metric that actually matters.

13 May 2026
Vulnerability Management Blue Team Threat Intelligence

Shai-Hulud: The Open-Source GitHub Actions Token Harvester That Just Went Public

TeamPCP's Shai-Hulud is a TypeScript/Bun C2 framework targeting GitHub Actions CI/CD pipelines — it steals GitHub tokens, exfiltrates via a fake git domain, and has now been open-sourced for anyone to deploy.

13 May 2026
Supply Chain Red Team Threat Intelligence

When the Weapon Learns: How Nation-States Weaponized AI Across the Full Attack Chain

Google GTIG's May 2026 report documents a turning point: state actors now use AI to write zero-day exploits, build self-navigating backdoors, and poison the AI supply chain itself.

11 May 2026
Threat Intelligence Malware Analysis Red Team

Europe's Digital Independence Push: EuroStack, Sovereign Cloud, and Breaking Free from US Infrastructure

France is migrating 2.5 million government PCs to Linux. Europe is building its own payment network to rival Visa and Mastercard. EuroStack aims to replace AWS and Azure. Here's what's happening, why it matters for security, and how realistic it is.

9 May 2026
Cybersecurity Cloud Security Data Sovereignty

CallPhantom: How 28 Fake Apps Collected Payments for Data That Never Existed

ESET uncovered CallPhantom — 28 Android apps with 7.3M downloads that sold fabricated call histories. A deep dive into the fraud mechanics, billing bypass, and how to protect yourself.

8 May 2026
Malware Analysis Threat Intelligence Mobile Security

The World's Most Dangerous Hacking Teams: A Guide to Nation-State APT Groups

Meet the elite state-sponsored hacking groups that stole billions, blacked out cities, and infiltrated governments. Who they are, what they want, and how they operate in 2026.

7 May 2026
Threat Intelligence Cybersecurity Malware Analysis

AutoHotkey Malware Loaders: How Attackers Weaponize Automation Scripts

AutoHotkey isn't just for productivity scripts — attackers use it as a stealthy malware loader. Learn how AHK-based campaigns work and how to detect them.

7 May 2026
Malware Analysis Detection Red Team

Claude Mythos: The AI That Rewrites the Rules of Cybersecurity — For Everyone

Anthropic built an AI that autonomously discovered a 27-year-old vulnerability in widely-used code. It can build working exploits from scratch. It's too dangerous to release publicly. Here's what that means for your bank, your government, your code — and the future of digital security.

7 May 2026
AI Security Cybersecurity Vulnerability Research

The 'Fix' Is the Exploit: ClickFix, FileFix, JackFix and Pastejacking Attacks Explained

ClickFix attacks trick users into running malicious code disguised as legitimate troubleshooting. Learn how these social engineering tactics work and how to defend against them.

7 May 2026
Cybersecurity Social Engineering Threat Intelligence

The Digital Parasite: How Attacker Tradecraft Evolved in 2026

80% of top MITRE ATT&CK techniques now focus on evasion and persistence. Attackers abandoned smash-and-grab for long-term parasitic operations in networks.

7 May 2026
Cybersecurity Lateral Movement MITRE ATT&CK

Why You Should Remove GAID From Your Android Phone Today

Discover why removing Google Advertising ID (GAID) from your Android device is crucial for privacy. Learn the simple steps to delete GAID and protect your data in 2026.

7 May 2026
Privacy Cybersecurity Network Security

Hacking Prison Sentences: Real Convictions That Should Terrify You

From 10 years to life in prison - real cybercrime convictions from Europe, USA, and Asia. DDoS, ransomware, and data theft aren't victimless crimes.

7 May 2026
Cybersecurity Threat Intelligence Privacy

Kimwolf Botnet: 2 Million Hijacked Devices Reshaping Threat Landscape

The Kimwolf botnet has compromised over 2 million devices worldwide by exploiting residential proxy networks and unsecured Android TV boxes. Here's what threat intelligence reveals about its infrastructure, tactics, and how to defend against it.

7 May 2026
Cybersecurity Malware Analysis Threat Intelligence

Project Glasswing: Anthropic's AI That Finds Zero-Days Better Than Humans

Anthropic just unveiled Claude Mythos Preview — an AI model too dangerous to release publicly, but powerful enough to find vulnerabilities that evaded detection for decades. Here's what it means and how to get involved.

7 May 2026
Cybersecurity AI Security Vulnerability Research

State-Sponsored Threat Actors 2026: Who They Are and What They Do

A threat intelligence deep-dive into the world's most dangerous state-sponsored APT groups — their identities, motivations, campaigns, and tradecraft in 2026.

7 May 2026
Threat Intelligence APT Nation-State

UEFI Bootkits: The Malware That Lives Below Your Operating System

UEFI bootkits survive OS reinstalls, hide from every AV and EDR tool, and can bypass Secure Boot on fully-patched systems. Here's how they work and what you can do about it.

7 May 2026
Malware Analysis Firmware Security Threat Intelligence

Xanthorox AI: When the Attacker's AI Goes Dark

Xanthorox is an offline, modular AI attack platform with five specialized models — and it needs no cloud, no API, and leaves no traditional IoCs. Here's what defenders need to know.

7 May 2026
Cybersecurity Malware Analysis AI Security

Violence-as-a-Service: How Organized Crime Borrowed the Cybercrime Playbook

Europol's OTF GRIMM has made 280 arrests in one year targeting criminal networks that outsource violence like a SaaS product. The model mirrors ransomware-as-a-service — and it's recruiting teenagers through Discord and encrypted apps.

29 April 2026
Threat Intelligence Cybercrime Organized Crime

MITRE ATT&CK v19: Defense Evasion Is Dead — Meet Stealth and Impair Defenses

ATT&CK v19 drops April 28 and splits Defense Evasion into two tactics. Here's what changes, why it matters for detection engineering, and what you need to do before the weekend.

26 April 2026
MITRE ATT&CK Detection Blue Team

From CVE to RCE in Hours: The Collapse of the Exploitation Window

The average time from vulnerability disclosure to active exploitation has collapsed from 756 days in 2018 to mere hours in 2025. Here's what that means for defenders.

14 April 2026
Vulnerability Management Blue Team Threat Intelligence

Vulnerability Exploitation Overtook Phishing — What That Means for Defenders

For the first time, vulnerability exploitation is the #1 initial access vector — not phishing. Here's what the data says and how defenders must adapt.

14 April 2026
Blue Team Vulnerability Management Detection

Modern Windows Attack Techniques in 2026: Evasion, Delivery, and Stealth

A structured guide to modern Windows attack techniques — BYOVD EDR evasion, LOLBins, invisible character injection, ClickFix delivery, NTFS steganography, and C2 over trusted cloud services. How they work, how to detect them.

8 April 2026
Red Team Blue Team Malware Analysis

OSINT and Recon Methodology: A Practical Guide for Security Professionals

How to systematically map an organization's attack surface using open-source intelligence — domains, infrastructure, employees, leaked credentials, and exposed secrets.

8 April 2026
Red Team Penetration Testing Threat Intelligence

Cookie-Controlled PHP Webshells: A Stealthy Tradecraft in Linux Hosting Environments

Microsoft's Defender team uncovered a clever attacker technique: PHP webshells that stay completely dormant until activated by a secret HTTP cookie. Here's how it works — and how to catch it.

4 April 2026
Web Security Red Team Blue Team

Salt Typhoon: How China Hacked the World's Largest Telecoms

Salt Typhoon is the worst telecom breach in history. The Chinese APT stayed hidden for years inside AT&T, Verizon and T-Mobile. Here's the full attack chain, the tools they used, and the detection opportunities blue teams missed.

17 March 2026
Threat Intelligence Red Team Blue Team

What 218 Million Honeypot Events Reveal About January 2026

Global honeypot sensors logged over 218 million malicious events in January 2026. MSSQL attacks doubled, botnet infrastructure expanded 50%, and attackers pivoted away from RDP toward database targeting.

14 February 2026
Cybersecurity Network Security Threat Intelligence

The Human Remains the Weakest Link – But Now It's AI-Assisted

AI has transformed social engineering into an automated, scalable threat. Learn how attackers leverage AI-powered phishing, deepfakes, and voice cloning—and what defenders can do about it.

27 December 2025
AI Security Social Engineering Threat Intelligence

Cybersecurity in 2025: Holiday Season Security Guide and Year-End Threats

Cybersecurity threats heading into 2025: AI-powered attacks, ransomware trends, and quantum threats — with practical security measures for the holiday season and beyond.

19 December 2025
Cybersecurity Ransomware Threat Intelligence
HiveSecurity

Offensive thinking. Defensive expertise.

Content
  • Home
  • Blog
  • Tags
  • Vulnerabilities
Resources
  • Tools
  • Cheat Sheet
  • Security Guides
Company
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege