
Hunt.io
@Huntio
Followers
3K
Following
157
Media
46
Statuses
697
https://t.co/9I6nRUiFjm is a service that provides threat intelligence data about observed network scanning and cyber attacks.
United States
Joined June 2023
๐ฅ Our new eBook is out: Modern Threat Hunting - 10 Practical Steps to Outsmart Adversaries. IOC pivots, SSH key tracking, ASN abuse, C2 clustering, all backed by real examples and HuntSQLโข queries. Grab your free copy ๐. #ThreatHunting #CyberSecurity.
hunt.io
Download our free eBook and learn how to uncover adversary infrastructure at scale in 10 practical, repeatable steps.
0
18
55
๐ Monitor Active Malware Infrastructure with Huntโs C2 Feed API. . C2 servers are the backbone of attacker operations, used to control infected systems, exfiltrate data, and deploy payloads. Our C2 Feed API gives you real-time, high-confidence.
hunt.io
Enhance your cyber intelligence with Hunt.io's Cyber Threat Enrichment API. Access high-confidence C2 feeds and streamline your threat intelligence today
0
0
1
โ ๏ธ WinRAR Zero-Day (CVE-2025-8088) Actively Exploited by Russian-Linked Group RomCom. A critical directory traversal vulnerability in WinRAR (versions before 7.13) is being weaponized by the RomCom group (also known as Storm-0978). Exploits disguise.
infosecurity-magazine.com
A flaw in WinRAR, tracked as CVE-2025-8088, has been exploited by the RomCom group to deploy malware
0
2
8
๐ฉ Researchers Discover XZ Utils Backdoor Still Hiding in Docker Hub Images. Binarly recently revealed that 35 Docker images, many based on Debian, still contain the #XZUtils backdoor (CVEโ2024โ3094) that was inserted into versions 5.6.0 and 5.6.1 in.
thehackernews.com
Researchers found 35 Docker Hub images, including Debian builds, still carrying the XZ Utils backdoor a year later, highlighting supply chain risks.
0
6
7
Threat hunting in action with Hunt. We uncovered a deceptive malware campaign aimed at Chineseโspeaking users, distributing backdoored installers for Signal, Line, Gmail, and BitBrowser via fake download pages. Domains such as z1.xiaowu[.]pw,.
hunt.io
Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.
0
4
19
๐ฉ Critical WordPress Plugin Vulnerability Affects 70K Sites. A PHP Object Injection flaw (CVEโ2025โ7384) in the โDatabase for Contact Formโฏ7, WPForms, Elementor Formsโ plugin allows unauthenticated attackers to inject PHP objects. With #ContactForm7.
searchenginejournal.com
WordPress vulnerability affecting up to 70,000 websites using contact form submissions database plugin.
0
2
7
RT @BleepinComputer: ERMAC Android malware source code leak exposes banking trojan infrastructure - @billtoulas. htโฆ.
bleepingcomputer.com
The source code for version 3 of theย ERMACย Android banking trojanย has been leaked online, exposing the internals of the malware-as-a-service platform and the operator's infrastructure.
0
12
0
๐งญ Why a Structured Threat Hunting Framework Elevates Cyber Defense. A Threat Hunting Framework isn't just bureaucracy, itโs the engine turning intuition into strategy. It sharpens investigations, improves consistency, and evolves with each hunt, helping.
hunt.io
Learn what a threat hunting framework is and explore essential strategies, components, and best practices for building a powerful and effective threat hunting framework
0
9
36
๐ฉ SocGholish Malware Spread via Ad Tools Delivers Access to LockBit, Evil Corp & Others. Researchers at Silent Push have uncovered a sophisticated campaign where the #SocGholish malware, known for fake browser-update lures, is now being distributed.
thehackernews.com
SocGholish malware spreads via fake updates, impacting major threat actors through TDS systems and JavaScript loaders.
0
6
12
Attackers move fast, hide well, and blend into the background noise of the internet. . To stay ahead, you need more than static IOCs and generic alerts, you need a repeatable way to discover, map, and track adversary infrastructure before itโs used.
hunt.io
Download our free eBook and learn how to uncover adversary infrastructure at scale in 10 practical, repeatable steps.
0
0
5
๐ฉ Threat Actors Weaponize Go Packages for Persistent Malware Delivery. Security teams uncovered 11 malicious Go modules, many typosquatting legitimate libraries, embedded with obfuscated code that launches payloads on both Linux and Windows. These.
cybersecuritynews.com
Sophisticated malware hits Go ecosystem via 11 obfuscated packages, delivering payloads to compromise Linux servers & Windows systems.
0
3
6
๐ฉ Critical โVault Faultโ Flaws in CyberArk & HashiCorp . Expose Secrets Managers.Researchers at Cyata disclosed 14 logic bugs across #CyberArk Conjur and #HashiCorp Vault that enable unauthenticated attackers to bypass authentication, escalate.
thehackernews.com
Vault Fault and ReVault flaws in CyberArk, HashiCorp, and Dell expose systems to takeover risks.
0
2
2
Your data sources should work for you. Our APIs deliver enriched IOCs, live C2 feeds, and open directory intel, direct to your tools. โ Integrate once, hunt forever.
hunt.io
Enhance your cyber intelligence with Hunt.io's Cyber Threat Enrichment API. Access high-confidence C2 feeds and streamline your threat intelligence today
0
0
1
โ ๏ธ Threat Actors Abuse Microsoft 365 Direct Send to Send Internal-Style Phishing Emails. . Since May 2025, over 70 organizations have been targeted with phishing campaigns that exploit the Direct Send feature in Exchange Online. This method bypasses SPF,.
cybersecuritynews.com
Hackers exploit Microsoft 365's Direct Send to spoof internal emails, bypassing security and boosting phishing success without credentials.
1
8
15
๐จ ๐๐๐ป๐.๐ถ๐ผ ๐ฑ๐ถ๐๐ฐ๐ผ๐๐ฒ๐ฟ๐ ๐ณ๐๐น๐น ๐๐ผ๐๐ฟ๐ฐ๐ฒ ๐ฐ๐ผ๐ฑ๐ฒ ๐น๐ฒ๐ฎ๐ธ ๐ผ๐ณ ๐๐ฅ๐ ๐๐ ๐ฉ๐ฏ.๐ฌ ๐ฏ๐ฎ๐ป๐ธ๐ถ๐ป๐ด ๐๐ฟ๐ผ๐ท๐ฎ๐ป. Our in-depth analysis covers its backend, frontend panel, exfiltration server, and builder, revealing exploitable weaknesses defenders can use to
0
21
53
RT @volrant136: ๐จ #Phishing the Forces: #Sidewinder Targets #SriLankaโs Defence Sector. Using @Huntio, I searched for webpages having POSTโฆ.
0
9
0
๐ฉ ClickFix Malware Campaign Exploits CAPTCHA Lures to Spread Cross-Platform Malware. A new #ClickFix variant is evading downloads entirely, now targeting macOS, Android, and iOS through browser redirects and fake shortener pages. On Android/iOS, the.
thehackernews.com
ClickFix malware replaced ClearFake in 2024, infecting users via fake CAPTCHAs and trusted platforms.
0
7
19
๐ IOC Hunter As Your Key to Smarter Threat Detection. . Huntโs IOC Hunter uncovers hidden links between domains, IPs, and certs, processes massive datasets, and delivers context you can act on. From hunting to incident response, get the precision you.
hunt.io
Automate and validate IOCs from top cyber research. Kick-start investigations with Hunt.io's fast, accurate, and expandable IOC Hunter tool. Book your demo today.
0
0
4