Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
No Auth, No Control: MCP Servers Found Exposing Internal Tools, Data, and APIs Publicly
Knostic researchers discovered over 1,800 MCP servers publicly exposed without authentication, allowing access to internal tools and APIs. Many connect to sensitive dashboards and services, posing significant risk. This systemic issue stems from insecure AI deployments lacking basic access controls, leaving systems vulnerable to exploitation and operational disruption.
HiddenLayer’s 2025 Threat Report Reveals 5 Leading AI Risks
HiddenLayer’s 2025 AI Threat Report outlines five top risks affecting AI systems, including supply chain exposure, public model malware, model theft, and chatbot exploitation. With 97% of enterprises using public models and only 16% running adversarial tests, the report calls for urgent improvements in AI-specific security controls.
Crypto24 Campaign Shows Operational Maturity, with Custom Tooling & EDR Evasion
Crypto24 ransomware operators have launched global attacks with custom tooling, including the RealBlindingEDR utility to disable security software. Using RDP abuse, keyloggers, and remote access tools, they bypass defenses and execute ransomware payloads stealthily. Trend Micro highlights their precision, off-peak targeting, and operational maturity across targeted industries.
UAT-7237 Targets Taiwan with Webshells, VPN Abuse, and Credential Theft
APT group UAT-7237 is targeting Taiwan’s technology sector using SoftEther VPN abuse, credential theft tools, and the SoundBill loader to deploy Cobalt Strike and Mimikatz. Cisco Talos links the group to broader Chinese threat ecosystems, noting selective webshell use and long-term persistence techniques across targeted cloud and VPN environments.
Backdoored XZ-Utils Library Persists in Public Docker Hub Repositories
Global Operation Seizes BlackSuit Ransomware Infrastructure and $1M in Crypto
Operation Checkmate dismantled BlackSuit ransomware infrastructure, seizing four servers, nine domains, and $1M in crypto tied to ransom payments. Linked to Royal and Conti, BlackSuit has extorted over $370M from 450+ U.S. victims. Law enforcement emphasized a disruption-first strategy targeting both infrastructure and financial lifelines of cybercrime groups.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)


