top of page


Comprehensive Cybersecurity Report: Cisco ASA Firewall Zero-Day Exploits Using RayInitiator and LINE VIPER Malware
Executive Summary This advisory report details a sophisticated exploitation campaign targeting Cisco ASA Firewall systems through...
Sep 287 min read


Fortra GoAnywhere Zero-Day CVSS 10 Exploit: In-Depth Analysis and Mitigation Strategies
Executive Summary In this report, Rescana presents an in-depth analysis of the critical zero-day vulnerability known as Fortra GoAnywhere...
Sep 285 min read


New COLDRIVER Malware Campaign Targets Windows Systems: BO Team and Bearlyfy Join Russia-Focused Cyberattacks
Executive Summary In this advisory report, Rescana presents an in-depth analysis of the new malware campaign involving COLDRIVER , BO...
Sep 287 min read


Fortra's Critical Patch Mitigates CVSS 10.0 Remote Code Execution Vulnerability in GoAnywhere MFT
Executive Summary In this advisory, Fortra has released a critical patch addressing a severe vulnerability in GoAnywhere MFT that has...
Sep 228 min read


Unmasking GPT-4-Powered MalTerminal Malware’s Ransomware and Reverse Shell Exploitation
Executive Summary Publication Date: September 21, 2025 In recent breakthroughs uncovered by leading cyber threat researchers, the...
Sep 226 min read


Canada Dismantles TradeOgre Exchange: $40 Million in Cryptocurrency Seized in Landmark Cybersecurity Operation
Executive Summary Publication Date: September 21, 2025. In a dramatic enforcement action that underscores the evolving nature of cyber...
Sep 226 min read


UNC1549 Cyber Attack: LinkedIn Job Lures & MINIBIKE Malware Breach Telecom Remote Management Systems in 11 Firms
Executive Summary The UNC1549 campaign represents an alarming evolution in cyber threat intelligence, demonstrating a sophisticated blend...
Sep 227 min read


ShadowLeak Vulnerability: ChatGPT Deep Research Agent Flaw Enables Invisible Gmail Email Theft
Executive Summary In this advisory report, Rescana presents a comprehensive analysis of the ShadowLeak vulnerability, a zero-click,...
Sep 225 min read


Russian Hackers Gamaredon and Turla Deploy Kazuar Backdoor Against Ukrainian Government Secure Workstation
Executive Summary Recent threat intelligence confirms that state-sponsored actors Gamaredon and Turla have entered into an...
Sep 227 min read


InsightLock Ransomware Breach: How VC Giant Insight Partners’ Critical Systems Were Compromised
Executive Summary Publication Date: September 17, 2025 This advisory report presents a comprehensive examination of the ransomware breach...
Sep 187 min read


Shai-Hulud Worm Targets NPM Ecosystem, Stealing Secrets from 180+ Packages
Executive Summary The recent Shai-Hulud Supply Chain Attack represents one of the most sophisticated assaults on software repositories...
Sep 186 min read


Scattered Spider Resurgence: Financial Sector Targeted with Microsoft Exchange Server Vulnerabilities
Executive Summary This advisory report addresses the alarming resurgence of the threat actor group Scattered Spider with a specific...
Sep 186 min read


Samsung Android Secure Boot & Kernel Integrity Patched: CVE-2025-21043 Zero-Day Exploit Fixed
Executive Summary In the wake of dynamic threat landscapes, Samsung has acted swiftly to mitigate a critical security flaw—...
Sep 145 min read


CVE-2025-5086 in DELMIA Apriso: Critical Vulnerability Actively Exploited with CISA Warning and Mitigation Strategies
Executive Summary In this advisory report we examine the unfolding threat of CVE-2025-5086 in DELMIA Apriso , a pivotal manufacturing...
Sep 146 min read


Comprehensive Analysis of DELMIA Factory Software Vulnerability Exploited in Cyber Attacks: Trends, Impact, and Mitigation Strategies
Executive Summary The purpose of this advisory report is to provide an in-depth technical analysis of the DELMIA Factory Software...
Sep 146 min read


Mitigating the Scattered Spider Vulnerability in Chrome V8, Firefox SpiderMonkey, and Safari WebKit
Executive Summary The modern browser has evolved into a multifaceted operating environment that no longer serves solely as a document...
Sep 27 min read


Sni5Gect Attack Exposes 5G Signaling Flaws in SX-5G Systems, Crashing Phones and Forcing 4G Downgrades
Executive Summary Recent developments in the cybersecurity landscape have revealed a novel and disruptive threat referred to as the...
Aug 276 min read


Citrix Gear Zero-Day Vulnerability Exploited for Unauthenticated RCE: Comprehensive Analysis and Mitigation Guide
Executive Summary Recent investigations and in-depth OSINT research have revealed that Citrix Gear devices, a critical component in...
Aug 277 min read


High-Severity Vulnerabilities Patched in Google Chrome V8 Engine and Mozilla Firefox Rendering Engine: Exploitation Analysis and Mitigation Strategies
Executive Summary This advisory report presents a comprehensive analysis of high-severity vulnerabilities patched in Google Chrome and...
Aug 206 min read


North Korea Cyber Espionage: GitHub Enterprise Server Attacked via Diplomat IT Worker Scheme Impacting 320+ Firms
Rescana Cyber Security Research Team Executive Summary The recent cyber espionage campaign attributed to North Korean state-sponsored...
Aug 207 min read
bottom of page
.png)