Please turn JavaScript on

ReliaQuest Blog - Threat Hunting, Security Operations, and More

follow.it gives you an easy way to subscribe to ReliaQuest Blog - Threat Hunting, Security Operations, and More's news feed! Click on Follow below and we deliver the updates you want via email, phone or you can read them here on the website on your own news page.

You can also unsubscribe anytime painlessly. You can even combine feeds from ReliaQuest Blog - Threat Hunting, Security Operations, and More with other site's feeds!

Title: ReliaQuest GreyMatter: The Agentic AI Security Operations Platform

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.71 / week

Message History

Editor’s note: This report was authored by Andrew Adams.

Key Points

ReliaQuest investigated a spearphishing campaign in which users are lured into running a Windows screensaver (.scr) file that discreetly installs a legitimate remote monitoring and management (RMM) tool, giving attackers interactive remote control.

The delivery chain is built ...


Read full story

Editor’s note: This report was authored by Gautham Ashok.

Key Points

“Sinobi” data-leak site postings surged 306%, making it a top three ransomware group in Q4.

“Clop” returned with a vulnerability-led campaign, exploiting CVE-2025-61882 to drive a short, high-volume wave of data theft extortion. Such mass exploitation of zero days in widely de...


Read full story

Editor’s note: This report was authored by Emily Jia.

Key Points

We investigated a phishing campaign that exploited social media private messages to deliver weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script—likely to deploy a remote access trojan (RAT).

...


Read full story

Editor’s note: This report was authored by Thassanai McCabe.

Key Points

Attackers scaled up trust exploitation, led by “BaoLoader” malware, which abused code-signing certificates instead of relying on novel exploits.

Initial access remained human-driven, with spearphishing links, spearphishing attachments, and drive-by compromise dominat...


Read full story