Vendor
high
advisory
Malware Distribution via Hugging Face and ClawHub
2 rules 1 TTPThreat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.
Atomic macOS Stealer
malware
social-engineering
ai-platforms
2r
1t
high
advisory
Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.
Cyber Protect Cloud Agent
privilege-escalation
acronis
agent
2r
1t
2c
medium
advisory
Persistence via Windows Installer (Msiexec)
3 rules 3 TTPsAdversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.
Windows +21
persistence
defense-evasion
3r
3t