top of page


SesameOp Malware Exploits OpenAI API for C2 in Microsoft Visual Studio Attacks
Executive Summary In July 2025, Microsoft’s Detection and Response Team (DART) identified a highly sophisticated malware campaign leveraging the SesameOp backdoor, which uniquely abuses the OpenAI Assistants API as a covert command-and-control (C2) channel. This innovative TTP (Tactics, Techniques, and Procedures) enables threat actors to blend malicious C2 traffic with legitimate API usage, effectively bypassing traditional network security controls and evading detection.
Nov 55 min read


Fake LastPass Death Claims Phishing Campaign Exploits Emergency Access to Breach Password Vaults
Executive Summary In mid-October 2025, a sophisticated phishing campaign targeting users of the LastPass password manager was identified and publicly disclosed by multiple security sources. The campaign, attributed to the financially motivated threat group CryptoChameleon (UNC5356), exploits the LastPass inheritance (emergency access) feature by sending fraudulent emails that claim a family member has requested access to the recipient’s password vault due to a supposed dea
Oct 267 min read


F5 BIG-IP Vulnerabilities Exploited: 85% Surge in US Government Cyberattacks Amid 2025 Shutdown
Executive Summary Between September and October 2025, the United States government experienced a significant surge in cyberattacks, with multiple sources referencing an 85% increase in incidents targeting federal agencies and critical infrastructure during the government shutdown. This escalation coincided with the expiration of the Cybersecurity Information Sharing Act of 2015 on September 30, 2025, and the onset of a government shutdown on October 1, 2025, which resulted in
Oct 266 min read


YouTube Ghost Network: 3,000 Malicious Videos Used to Spread Infostealer Malware via Compromised Channels
Rescana Cyber Threat Intelligence Executive Summary A sophisticated and large-scale malware distribution campaign, identified as the YouTube Ghost Network , has been exposed by Check Point Research. This operation weaponized over 3,000 YouTube videos, leveraging both fake and compromised accounts to disseminate a range of infostealer malware families. The campaign exploited YouTube’s inherent trust signals—such as high view counts, likes, and positive comments—to lure unsuspe
Oct 265 min read


F5 BIG-IP Breach 2025: Nation-State Attack Exposes Source Code and Undisclosed Vulnerabilities
Executive Summary On October 15, 2025, F5 publicly disclosed a significant cybersecurity breach involving a nation-state actor who gained persistent access to its internal development and engineering knowledge management systems. The breach, first detected on August 9, 2025, resulted in the exfiltration of files containing portions of BIG-IP source code, information on undisclosed vulnerabilities, and configuration or implementation data for a limited number of customers. I
Oct 155 min read


Attackers Season Spam With a Touch of 'Salt' to Bypass Microsoft 365 and Google Workspace Email Security
Executive Summary The "Attackers Season Spam With a Touch of 'Salt'" campaign represents a sophisticated evolution in spam and phishing...
Oct 85 min read


BatShadow Group Exploits Windows Systems with New Go-Based Vampire Bot Malware Targeting Job Seekers and Digital Marketers
Rescana Threat Intelligence Report BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers Date: October 7, 2025...
Oct 85 min read


Asahi Group Holdings Ransomware Attack 2025: Digital Order System Disrupted, Nationwide Beer Shortage in Japan
Executive Summary On September 29, 2025, Asahi Group Holdings experienced a significant ransomware attack that severely disrupted its...
Oct 86 min read


BK Technologies IT Systems Breach: Employee Data Compromised in Public Safety Communications Cyberattack (2025)
Executive Summary On September 20, 2025, BK Technologies , a provider of communications equipment for public safety and government...
Oct 86 min read


DraftKings Account Breaches: Credential Stuffing Attacks Expose Customer Data and Financial Risks
Executive Summary DraftKings, a leading sports betting and daily fantasy sports provider, has experienced multiple waves of account...
Oct 87 min read


SORVEPOTEL Malware: Comprehensive Analysis of Self-Spreading WhatsApp Threat Targeting Windows Systems
Executive Summary Publication Date: October 2025 Researchers have identified a sophisticated, self-propagating malware campaign named...
Oct 55 min read


Scattered Lapsus$ Hunters Launch Data Leak Site Targeting Salesforce: Massive OAuth Supply Chain Breach Exposes 1 Billion Records
Executive Summary On October 3, 2025, a coalition of threat actors known as Scattered Lapsus$ Hunters —comprising members of the...
Oct 57 min read


Discord Zendesk Data Breach 2025: Support Ticket System Compromised by Scattered Lapsus$ Hunters
Executive Summary On September 20, 2025, Discord disclosed a data breach resulting from the compromise of a third-party customer service...
Oct 56 min read


Taldor Cyber Attack : In-Depth Analysis of Advanced Malware Intrusion in Industrial Systems
Executive Summary On 30 September 2024, Taldor Cyber & Security was the target of a significant cyberattack, as reported by PC.co.il...
Sep 304 min read


Gcore Radar Report 2025: Gaming Platforms Under Siege from Sophisticated DDoS Attacks
Executive Summary The recent Gcore radar report highlights a significant shift where the gaming industry has overtaken traditional...
Sep 253 min read


Microsoft Announces Free Windows 10 Security Updates in Europe for Legacy System Protection
Executive Summary Microsoft’s recent initiative to offer free Windows 10 security updates in Europe marks a significant evolution in how...
Sep 252 min read


Feds Tie Scattered Spider Duo to $115M in Ransoms: Legacy System Exploits in Municipal and Financial Networks Uncovered
Executive Summary Publication Date: September 24, 2025 This report provides a detailed, evidence-based analysis of the recent incident...
Sep 259 min read


North Korean Hackers Exploit AkdoorTea Backdoor to Target CryptoDev Toolkit – Comprehensive Cybersecurity Report
Executive Summary In recent months, intelligence sources have observed a sophisticated and concerning evolution in cyber tactics,...
Sep 257 min read


In-Depth Analysis: Supply Chain Poisoning of Popular npm Packages Exploiting event-stream, ua-parser-js, and More
Executive Summary In recent months, security researchers have observed a sophisticated supply chain attack targeting highly popular npm ...
Sep 147 min read


US Offers $10M Reward for Ukrainian Ransomware Operator Targeting Critical Infrastructure Systems
Executive Summary Publication Date: Oeptember 10, 2025 In an unprecedented effort to counter the rapid evolution of cyber threats and to...
Sep 106 min read
bottom of page
.png)