Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Analyzing TAX#TRIDENT: Fake Indian Tax Lures Pivot Across ZIP, VBS, Stego and PHP-Wrapped VBS Delivery

Securonix Threat Research tracks TAX#TRIDENT, an active fake Indian Income Tax-themed campaign that uses three delivery paths to reach Windows endpoints. The campaign starts with fake tax assessment lures and then moves victims toward ZIP files, VBScript downloaders, or PHP-looking web endpoints that actually return script content.

From Threat Awareness to Proof: Closing the Exposure Validation Gap in the Modern SOC

For most organizations, answering these questions is slow, manual, and difficult to defend. Analysts must interpret threat reports, build SIEM queries, run retroactive searches, and validate findings under pressure. The result is delayed answers, inconsistent processes, and limited confidence at the executive level. This is the gap between threat awareness and proof of exposure. It is where operational risk and board-level scrutiny converge.

Rethinking Threat Intelligence with the Threat Research Agent

Modern security teams are not lacking data. They are drowning in it. Threat intelligence feeds, indicators, campaigns, internal detections, and investigation artifacts are constantly growing in volume and complexity. Yet when analysts need answers, they are often forced to manually search, pivot, correlate, and interpret across multiple data points. This creates a familiar problem: too much data, not enough clarity.

VENOMOUS#HELPER: Dual-RMM Phishing Campaign Leveraging JWrapper-Packaged SimpleHelp and ScreenConnect for Silent Remote Access

Phishing campaigns leveraging remote management tools is nothing new. Securonix Threat Research has conducted in-depth dynamic analysis of an ongoing phishing campaign targeting multiple vectors, active since at least April 2025. The campaign has impacted over 80 organizations, predominantly in the United States, spanning multiple sectors. This campaign leverages vendor-signed Remote Monitoring and Management (RMM) software to establish silent, persistent access.

Mythos, Attackers, and The Part People Still Want To Skip

Anthropic built a powerful AI model and then kept it on a short leash. The important part is not that a model found bugs, which has been coming for a while. What’s worth acknowledging is that Anthropic looked at what Mythos could do and decided broad release was a bad idea. Attackers do not need a perfect autonomous system. They need leverage.

Complexity in the Stack Is Slowing Down Decisions

Security environments did not become complex by design. They evolved incrementally. Each tool addressed a gap in detection, visibility, or response. Over time, the architecture expanded, but the system was never designed to operate as a single decision layer. Data moves between systems, but context does not consistently follow. Alerts surface without full entity history. Intelligence exists, but it is not always applied at the point where decisions are made.

From Zoomin to Fluid Topics: Evolving the Securonix Documentation Experience

By: Mark Johnson, Manager, Knowledge Engineering You’ve heard it said: “The more things change, the more they stay the same.” Well, sometimes, everything changes and you don’t even notice! This just happened. The Securonix Documentation Portal changed completely, and everything looks the same! (Well, almost.) A few years ago, Securonix set out to modernize how customers interact with product documentation.