April 10, 2026
April 10, 2026 Hash 1775a45a53c4b17ee1580c16b07013a19 248607771fe87402b3f747f08b8e8efa2 35cc2134e19e1370d3f2ae088e92b2f58 URL 1https[:]//app99[.]mgea12o[.]cfd/ 2http[:]//101[.]55[.]21[.]56/ 3http[:]//serenity[.]com[.]es/ IP 192[.]118[.]39[.]76 2189[.]8[.]5[.]118 3187[.]251[.]123[.]104...
Q1 2026 Attack Technique Trends Report
overview The cyber attack landscape in Q1 2026 was characterized by a step change from traditional mass-automated threats, with accelerated penetration rates driven by the use of AI, identity-centric attacks, exploitation of supply chain and SaaS linkages, and a combination of social engineering and vulnerability exploitation. threat actors are no
LOLBins – Analysis of MSBuild-Based Attack Techniques
Overview In recent years, cyber threat actors have consistently attempted to exploit living off the land binaries (LOLBins) built into systems to bypass detection by security products. Such attack methods effectively evade traditional signature-based detection by not distributing a separate malicious file, but instead relying on tools trusted by the
March 2026 Infostealer Trend Report
Description. this report analyzes Infostealer distribution trends and cases collected during the month of March 2026. It is based on data collected through ASEC’s automated collection and analysis system and ATIP’s real-time IOC service. Purpose and Scope. the purpose of the analysis is to identify trends in the volume, distribution

