Archives: Out of Band

CHINA CYBERSECURITY THREAT INTELLIGENCE REPORT
2026-04-22
CHINA CYBERSECURITY THREAT INTELLIGENCE REPORT

Executive Summary: China’s cyber threat landscape during 2025–2026 is shaped by sustained

APT Profile – Red Menshen
2026-04-22
APT Profile – Red Menshen

Red Menshen is a China-linked advanced threat actor active since at least 2021, known for deploying

Crystal Ball Series
2026-04-22
Crystal Ball Series

Crystal Ball Series In this Instalment we Explore Preemptive Cybersecurity will Dominate as Standard

GOVERNMENT & CIVIC Q1 I 2026 : INDUSTRY REPORT
2026-04-20
GOVERNMENT & CIVIC Q1 I 2026 : INDUSTRY REPORT

EXECUTIVE SUMMARY The CYFIRMA Industry Report delivers original cybersecurity insights and telemetry-driven

Operation PhantomCLR : Stealth Execution via AppDomain Hijacking and In-Memory .NET Abuse
2026-04-17
Operation PhantomCLR : Stealth Execution via AppDomain Hijacking and In-Memory .NET Abuse

EXECUTIVE SUMMARY At CYFIRMA, we continuously monitor evolving cyber threats targeting enterprises

Fortnightly Vulnerability Summary
2026-04-15
Fortnightly Vulnerability Summary

Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.

Crystal Ball Series
2026-04-14
Crystal Ball Series

Crystal Ball Series In this Instalment we Explore Attackers will Overwhelmingly Avoid Persistence

Silent Crypto Wallet Takeover Unlimited USDT Approval Exploitation via Trust Wallet QR Code Phishing
2026-04-14
Silent Crypto Wallet Takeover Unlimited USDT Approval Exploitation via Trust Wallet QR Code Phishing

EXECUTIVE SUMMARY This report details an active QR code–based crypto drainer campaign targeting

CVE-2026-1492 WordPress User Registration & Membership Authentication Bypass Flaw
2026-04-11
CVE-2026-1492 WordPress User Registration & Membership Authentication Bypass Flaw

EXECUTIVE SUMMARY CVE-2026-1492 is a critical authentication bypass and privilege escalation vulnerability

TRACKING RANSOMWARE : March 2026
2026-04-08
TRACKING RANSOMWARE : March 2026

EXECUTIVE SUMMARY Ransomware activity in March 2026 reflects a maturing, highly adaptive, and increasingly

Crystal Ball Series
2026-04-08
Crystal Ball Series

Crystal Ball Series In this Instalment we Explore Exploit timing will dominate over sophistication

CONSUMER GOODS SERVICES Q1 I 2026 : INDUSTRY REPORT
2026-04-06
CONSUMER GOODS SERVICES Q1 I 2026 : INDUSTRY REPORT

CONSUMER GOODS SERVICES Q1 I 2026 : INDUSTRY REPORT EXECUTIVE SUMMARY The CYFIRMA Industry Report

Malaysia Threat Landscape Report
2026-04-03
Malaysia Threat Landscape Report

Malaysia Threat Landscape Overview Malaysia faces a persistent and increasingly complex cyber threat

Fortnightly Vulnerability Summary
2026-04-02
Fortnightly Vulnerability Summary

Fortnightly Vulnerability Summary CHECK OUT THESE FAST FACTS ON FORTNIGHTLY OBSERVED VULNERABILITIES.

HONG KONG CYBERSECURITY THREAT INTELLIGENCE REPORT
2026-04-02
HONG KONG CYBERSECURITY THREAT INTELLIGENCE REPORT

Executive Summary This report provides a threat intelligence assessment of the cyber risk landscape

PROFESSIONAL GOODS SERVICES Q1 I 2026 : INDUSTRY REPORT
2026-03-31
PROFESSIONAL GOODS SERVICES Q1 I 2026 : INDUSTRY REPORT

PROFESSIONAL GOODS SERVICES Q1 I 2026 : INDUSTRY REPORT EXECUTIVE SUMMARY The CYFIRMA Industry Report

CYBER THREAT LANDSCAPE REPORT – TAIWAN
2026-03-28
CYBER THREAT LANDSCAPE REPORT – TAIWAN

EXECUTIVE SUMMARY Taiwan’s threat landscape in 2026 remains one of the most dynamic and geopolitically

CrySome RAT : An Advanced Persistent .NET Remote Access Trojan
2026-03-27
CrySome RAT : An Advanced Persistent .NET Remote Access Trojan

EXECUTIVE SUMMARY CrySome is a feature-rich remote access trojan (RAT) developed in C# for the .NET

DEAD INFRASTRUCTURE HIJACKING – A COMPLETE AND PRECISELY BOUND THREAT ASSESSMENT
2026-03-24
DEAD INFRASTRUCTURE HIJACKING – A COMPLETE AND PRECISELY BOUND THREAT ASSESSMENT

EXECUTIVE SUMMARY Dead Infrastructure Hijacking (DIH) is the exploitation of residual trust relationships

SINGAPORE THREAT LANDSCAPE
2026-03-23
SINGAPORE THREAT LANDSCAPE

EXECUTIVE SUMMARY Singapore’s cyber threat landscape is increasingly shaped by the intersection