Skip to content

The digital town square for the concert band community.

Connect with local ensembles, trade repertoire insights, and keep the pulse of the wind band world.

  • New.

    World infosec malware threatresearch phishing
    1
    0 Votes
    1 Posts
    0 Views
    AAA
    New.Any.Run: New Phishing Campaign Targets US with Credential Theft: What CISOs Need to Know https://any.run/cybersecurity-blog/us-fake-invitation-phishing/ @anyrun_app #infosec #malware #threatresearch #phishing
  • New.

    World infosec openclaw threatresearch
    1
    0 Votes
    1 Posts
    0 Views
    AAA
    New.Zscaler: Malicious OpenClaw Skill Distributes Remcos RAT and GhostLoader https://www.zscaler.com/blogs/security-research/malicious-openclaw-skill-distributes-remcos-rat-and-ghostloader #infosec #OpenClaw #threatresearch
  • New.

    World infosec threatresearch
    1
    0 Votes
    1 Posts
    0 Views
    AAA
    New.Socket: Malicious Checkmarx Artifacts Found in Official KICS Docker Repository and Code Extensions https://socket.dev/blog/checkmarx-supply-chain-compromise @SocketSecurity #infosec #threatresearch
  • 0 Votes
    1 Posts
    0 Views
    AAA
    New. There's more, but this is getting too long.Zscaler: Payouts King Takes Aim at the Ransomware Throne https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild https://www.picussecurity.com/resource/blog/cve-2026-21643-critical-sql-injection-in-fortinet-forticlient-ems-exploited-in-the-wildMicrosoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/Sohos: QEMU abused to evade detection and enable ransomware delivery https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery @SophosXOps Sekoia: From APT28 to RePythonNET: automating .NET malware analysis https://blog.sekoia.io/apt28-to-repythonnet-automating-net-malware-analysis/ @sekoia_io Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook https://www.proofpoint.com/us/blog/threat-insight/beyond-breach-inside-cargo-theft-actors-post-compromise-playbook Group-IB: W3LL Unmasked https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/ Posted yesterday:Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading https://www.halcyon.ai/blog/44-percent-and-rising-automotive-ransomware #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime