I hear ImageMagick is fun to hack on. Go nuts.
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp
Here, have more.
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp29-wxp5-wh82
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6hgw-6x87-578x
I hear ImageMagick is fun to hack on. Go nuts.
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp
There are so many of these little apps that people are running within user permissions that are creepy as hell and hard to track down if you play whack-a-mole instead of explicit allow lists.
https://www.gdatasoftware.com/blog/2025/08/38247-justaskjacky-ai-trojan-horse-comeback
#threatIntel
I know I keep saying it but I really need to kick #GAYINT into gear. Unit42 is using weird names for individual groups or operations that they're calling strike teams within Muddled Libra / UNC3944 / Scattered Spider / Lapsus$ / whatever new name the multi-billion dollar security companies are calling the kids these days.
https://unit42.paloaltonetworks.com/muddled-libras-strike-teams/
#threatIntel
Picus Security has a nice timeline on the escalation of Raspberry Robin.
https://www.picussecurity.com/resource/blog/raspberry-robin-malware-in-2025-from-usb-worm-to-elite-initial-access-broker
#threatIntel
Yet another write-up on Fire Ant, but this one from Sygnia is more thorough than most I've seen.
https://www.sygnia.co/articles/fire-ant-hypervisor-espionage-analysis/
#threatIntel
Apparently there is also a new version of Oyster. IOCs and analysis in the post from Cato Networks.
https://www.catonetworks.com/blog/cato-ctrl-oyster-malware-campaign/
#threatIntel
Intezer has a write-up on a new version of Firewood backdoor. Nothing too exciting but it has some IOC hashes in the post.
https://intezer.com/blog/threat-bulletin-firewood/
#threatIntel
More camera vulns. These ones are in INSTAR 2K+ and 4K models.
https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf
Go hack more AI shit.
https://research.jfrog.com/vulnerabilities/codex-cli-symlink-arbitrary-file-overwrite-jfsa-2025-001378631/