Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration significantly advanced the investigation. It alerted us to a detected sample communicating with a compromised site we were monitoring, enabling a joint analysis. The Georgian CERT was then instrumental in evidence acquisition and conducting a forensic analysis of the compromised site itself, which the attackers leveraged as a proxy to their actual ...
The Voice of Cyber®
Threat Intelligence
Threat Intelligence is a cornerstone of effective cybersecurity involving the collection, analysis, and dissemination of information about potential cyber threats to inform decision-making and enhance an organisation’s security posture. Threat intelligence encompasses data on emerging vulnerabilities, attack techniques, and the tactics employed by threat actors.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title
Turning Camera Surveillance on its Axis

Introduction
Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the ...

Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first ...

Why this cyber attack on a Norwegian dam should have you paying attention

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a ...

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking ...
No results found.
In The News
Sort By
- Date
- Title
New Cyber Intelligence Reveals ‘Internet Tsunami’ Attacks and Rising Automation in Global Attacks
Ransomware readiness lags as adversaries use AI across the attack chain to accelerate intrusion, encryption, and extortion
Infoblox Threat Intel (ITI), together with the United Nations Office on Drugs and Crime (UNODC), has linked BBIN aka Baoying Group, one of Asia’s largest iGaming providers, ...
Salt Typhoon, a China-linked cyber espionage group, has been observed targeting global infrastructure using stealthy techniques such as DLL sideloading and zero-day exploits. ...
Chinese-speaking actors evade government restrictions and solicit criminal services through anonymized marketplaces; AI-accelerated ransomware operations signal next ...
SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft ...
No results found.




