WhisperX tag archive

#threat intelligence

This page collects WhisperX intelligence signals tagged #threat intelligence. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (20)

The Lab · 2026-04-14 11:22:57 · GitHub Issues

1. ENISA Known Exploited Vulnerabilities (KEV) Data Now Extracted into Normalized Format

A new extractor has been implemented to systematically pull data from the ENISA Known Exploited Vulnerabilities (KEV) catalog. This development moves critical European cybersecurity threat intelligence into a structured, machine-readable format, enabling more efficient analysis and integration into security tools. The ...

The Network · 2026-04-17 12:52:41 · Habr

2. Сбер X-TI: бесплатная платформа киберразведки для бизнеса — что скрывается за открытым доступом?

Сбер открыл для российских компаний внутреннюю платформу киберразведки, которую восемь лет строил для собственной защиты. Речь идет о Sber X-Threat Intelligence (X-TI), запущенной в ноябре 2024 года. Этот инструмент, предлагающий базы данных, аналитику и сервисы мониторинга, стоит «ровно ноль рублей», что бросает вызов...

The Lab · 2026-05-09 04:01:54 · Mastodon:mastodon.social:#ransomware

3. Ransomware Group Incransom Lists Calsoft Inc on Data Leak Site, Signaling Possible Data Exfiltration

The ransomware operation Incransom has published a new entry on its dark web leak site, adding Calsoft Inc to its list of claimed victims. The posting, flagged through open-source threat intelligence channels, suggests the group may have exfiltrated sensitive data from the target and could be preparing to release it un...

The Lab · 2026-05-09 11:01:49 · Mastodon:mastodon.social:#ransomware

4. MedusaLocker Ransomware Group Publishes New Blog Post Identifying 'BAVADAI'

MedusaLocker ransomware group has published a new blog post titled "BAVADAI," according to cyber threat intelligence monitoring channels. The post represents the latest activity from the established ransomware operation, flagged across multiple threat intelligence platforms tracking the group's ongoing campaigns. While...

The Lab · 2026-05-09 18:01:41 · Mastodon:mastodon.social:#ransomware

5. Genesis Ransomware Group Lists Five New Victims Including Healthcare and Engineering Firms

The ransomware group Genesis has published claims against five organizations on its dark web leak site, marking a significant burst of activity from this emerging threat actor. The newly listed targets span multiple sectors: Rain Makers Solutions, Van Atta Engineering, Prescott & Holden, The American Board of Preventiv...

The Lab · 2026-05-10 02:31:49 · Mastodon:mastodon.social:#ransomware

6. Wayne Brothers Appears on Leak Bazaar Ransomware Portal, Potential Data Exposure Under Scrutiny

Wayne Brothers has been identified in a new posting on Leak Bazaar, a known ransomware leak site associated with data extortion operations. The appearance of an organization on such a platform typically signals that a ransomware group or affiliate is either threatening to release or has begun publishing allegedly stole...

The Lab · 2026-05-10 07:31:55 · Mastodon:mastodon.social:#infosec

7. IncRansom Ransomware Group Lists Sibilla Capital and Lopez Law Firm on Leak Site

The IncRansom ransomware operation has added two new entries to its dark web blog, listing sibillacapital.com and lopezlawfl.com as apparent targets. The postings, detected through threat intelligence monitoring channels, signal fresh activity from a group that has established itself in the ransomware ecosystem. The UR...

The Vault · 2026-05-10 11:01:40 · Mastodon:mastodon.social:#infosec

8. Qilin Ransomware Group Claims Attack on Fogel Capital Management

The ransomware actor known as "Qilin" has posted an unverified claim targeting Fogel Capital Management, according to threat intelligence circulating on dark web monitoring channels. The nature and extent of the alleged incident remain undisclosed, and the claim has not been independently confirmed. Security researcher...

The Lab · 2026-05-10 15:31:39 · Mastodon:mastodon.social:#infosec

9. Lapsus$ Ransomware Group Names AXCERA.IO in Latest Blog Post

The ransomware group Lapsus$ has published a new blog post identifying AXCERA.IO as a target, signaling potential exposure for the organization and drawing attention from cybersecurity researchers tracking the group's activities. The post appeared on the group's known communication channel and was quickly flagged by th...

The Lab · 2026-05-10 15:31:55 · Mastodon:mastodon.social:#ransomware

10. LYNX Ransomware Claims lifelongaccess[.]org as Latest Victim in Dark Web Data Breach

The LYNX ransomware operation has surfaced on dark web channels with claims of a successful breach targeting lifelongaccess[.]org, marking the organization's appearance on the group's victim list. The disclosure was flagged through threat intelligence monitoring channels, with the claim now circulating across OSINT and...

The Lab · 2026-05-11 14:40:30 · SecurityWeek RSS

11. Google Uncovers First AI-Generated Zero-Day Exploit Designed to Bypass 2FA

Google's threat intelligence team has identified what appears to be the first documented zero-day exploit generated using artificial intelligence, a development that cybersecurity researchers are calling a potential inflection point in the evolution of cyber threat capabilities. The exploit was specifically engineered ...

The Vault · 2026-05-11 17:38:28 · Mastodon:mastodon.social:#osint

12. COINBASECARTEL ransomware group lists Tab Service as victim on dark web leak site

An OSINT investigation flagged a notable development in the ransomware ecosystem: the COINBASECARTEL threat actor listed Tab Service as a victim on their dark web leak site, according to monitoring reports shared via open source intelligence channels. The posting, flagged in the #osint community on Mastodon and tracked...

The Lab · 2026-05-11 17:48:26 · r/blueteamsec

13. Python Backdoor Discovered in AI Deepfake Impersonation Attack Chain: Threat Intelligence Breakdown

Security researchers at Genians have identified a Python-based backdoor deployed as part of an AI-driven deepfake impersonation campaign, marking a notable convergence of social engineering tactics and commodity malware in targeted operations. The attack chain leverages synthetic media to impersonate trusted entities, ...

The Lab · 2026-05-11 19:18:21 · The Hacker News Echo RSS

14. Google Confirms First AI-Developed Zero-Day Exploit Used to Bypass 2FA at Scale

Google has confirmed that an unidentified threat actor deployed a zero-day exploit in the wild that was likely developed using an artificial intelligence system—the first documented case of AI being weaponized for vulnerability discovery and exploit generation. The disclosure marks a significant escalation in the pract...

The Lab · 2026-05-11 20:18:26 · Techmeme Echo RSS

15. Google Threat Intelligence Group Thwarts Alleged AI-Driven Mass Exploitation Plot, Flags OpenClaw Tool in Cyber Offensive Push

Google's Threat Intelligence Group (TIG) has reported that it likely disrupted an attempt to weaponize artificial intelligence for a mass exploitation event, marking a significant development in the evolving intersection of AI capabilities and cyber threat operations. The disclosure, contained in a report released by t...

The Lab · 2026-05-11 21:18:26 · Browser Cybersecurity Dive

16. First Known AI-Developed Zero-Day Exploit Intercepted Before Weaponization, Google Researchers Warn

Google Threat Intelligence Group (GTIG) has documented what researchers believe to be the first successful use of AI to develop a working zero-day exploit. The capability demonstration, outlined in a report released Monday, signals a potential inflection point in the scale and velocity of cyber threat operations. The t...

The Lab · 2026-05-12 08:48:25 · Mastodon:hachyderm.io:#cybersecurity

17. Google Identifies First Potentially AI-Generated Zero-Day Exploit Bypassing 2FA Through Logic Flaw

Google's cybersecurity researchers have flagged what appears to be the first zero-day exploit credibly attributed to AI-generated code, raising fresh concerns about the accelerating maturity of AI-driven offensive operations. The exploit leveraged a semantic logic flaw in a web administration tool to circumvent two-fac...

The Lab · 2026-05-12 09:48:19 · r/artificial

18. Google Intercepts AI-Powered Cyberattack Exploiting Undisclosed Corporate Vulnerability

Google has disrupted a cyberoperation in which threat actors deployed artificial intelligence to exploit an unknown weakness in a target company's digital defenses, marking what security analysts describe as a significant escalation in AI-enabled hacking. The tech giant disclosed limited details about the specific att...

The Lab · 2026-05-12 20:18:38 · The Next Web

19. Google's Threat Intelligence Unit Detects First AI-Generated Zero-Day Exploit, Prevents Planned Mass Attack

Google has identified what it believes is the first zero-day exploit developed using artificial intelligence. The discovery, made by Google's Threat Intelligence Group, marks a potential inflection point in the evolution of cyberthreat capabilities. The criminal threat actor behind the exploit intended to deploy it in ...

The Lab · 2026-05-13 12:48:27 · Mastodon:hachyderm.io:#privacy

20. Google Researchers Confirm AI Now Used to Develop Zero-Day Exploits in Real-World Operations

A growing assumption in the cybersecurity industry holds that artificial intelligence primarily strengthens defensive capabilities—faster threat detection, automated incident response, smarter anomaly identification. Google researchers have now publicly challenged that premise, presenting evidence that AI is actively e...