top of page


MostereRAT Malware on Windows: Advanced Process Injection and Security Tool Blocking Uncovered
Executive Summary Publication Date: September 09, 2025. The MostereRAT malware represents an evolution in the Remote Access Trojan (RAT)...
Sep 9, 20257 min read


Salesloft GitHub Account Compromise: Detailed Analysis of Internal Credential Breach and Mitigation Strategies
Executive Summary Publication Date: September 9, 2025. The incident involving the breach of Salesloft via a compromised GitHub account...
Sep 9, 20256 min read


GhostAction GitHub Supply Chain Attack: Hackers Steal 3,325 Secrets from a Critical CI/CD Repository
Executive Summary Publication Date: September 09, 2025 The GhostAction GitHub supply chain attack is a sophisticated breach that...
Sep 9, 20258 min read


Rescana Cybersecurity Report: Grok AI Exploits, US Manufacturing Attacks, and Gmail Security Debunked
Executive Summary Publication Date: September 05, 2025 Rescana presents this comprehensive cybersecurity advisory report that examines...
Sep 5, 20256 min read


VirusTotal Exposes 44 Undetected SVG Files Leveraging Base64 Encoding to Deploy Phishing Pages on Web Browsers
Executive Summary Publication Date: September 05, 2025 In a recent groundbreaking investigation, VirusTotal has identified 44 undetected...
Sep 5, 20258 min read


SAP S/4HANA CVE-2025-42957 Critical Vulnerability Analysis: Exploitation in the Wild, Impact, and Mitigation Strategies
Executive Summary This advisory report provides an in-depth analysis of the critical CVE-2025-42957 vulnerability affecting SAP S/4HANA ...
Sep 5, 20257 min read


Nevada Cyberattack on Legacy Databases Disrupts IT Systems and Forces State Office Closures
Executive Summary Publication Date: August 26, 2025. The incident report details a cyberattack affecting Nevada state offices and...
Aug 27, 20253 min read


In-Depth Analysis of Docker Desktop Vulnerability: Container Escape, Host Compromise, and APT Exploitation
Executive Summary The recent disclosure of the Docker Desktop Vulnerability Leads to Host Compromise represents a formidable threat that...
Aug 27, 20258 min read


Google's Android Developer Verification Initiative: Blocking Malware on Google Play
Executive Summary Publication Date: August 26, 2025 This report explores the recent initiative by Google to verify all Android...
Aug 27, 20252 min read


Chip Programming Firm Data I/O Ransomware Incident: Detailed Analysis of Phishing Exploits, Remote Access Vulnerabilities, and Semiconductor Impact
Executive Summary Published: August 25, 2025. On August 25, 2025, Chip Programming Firm Data I/O experienced a significant ransomware...
Aug 25, 20256 min read


Transparent Tribe's Weaponized Desktop Shortcuts Phishing Attack Compromises Indian Government Networks
Executive Summary Publication Date: August 25, 2025. The advisory report details the recent incident in which Transparent Tribe ...
Aug 25, 20258 min read


Cyberattack on Iranian Maritime Communication Systems: Exploiting Legacy Software Vulnerabilities with MITRE ATT&CK Techniques
Executive Summary Publication Date: August 22, 2025 In 22 August 2025 an incident was reported by Caliber (https://caliber.az/en/post/c...
Aug 24, 20257 min read


DaVita Healthcare Data Breach Analysis: Ransomware Attack Exfiltrates Data of 2.7 Million Patients
Executive Summary Publication Date: August 22, 2025. The incident involving DaVita centers on a reported breach in which a ransomware...
Aug 24, 20258 min read


Silk Typhoon Exploits Commvault Vulnerabilities to Breach North American Cloud Infrastructures
Executive Summary The recent rise of advanced attacks from the notorious threat actor known as Silk Typhoon presents a serious threat to...
Aug 24, 20256 min read


GeoServer Exploits, PolarEdge Tactics, and the Gayfemboy Push Cybercrime Campaign: A Rescana Cybersecurity Intelligence Report
Executive Summary In recent months, the rapidly evolving cyber threat landscape has witnessed an alarming escalation in the...
Aug 24, 20258 min read


APT36 Exploits Linux .desktop Files to Install Malware on Linux Systems
Executive Summary In recent developments, the state-sponsored threat actor APT36 has advanced its operational strategies by exploiting...
Aug 24, 20257 min read


Rescana Cybersecurity Report: Linux Servers Targeted by Malware Using Malicious RAR Filenames to Evade Antivirus Detection
Executive Summary Publication Date: 22 August 2025 In recent cybersecurity investigations, a highly sophisticated Linux malware campaign...
Aug 24, 20256 min read


Google Mandates 15-Region Crypto App Licensing for Play Store Amid FBI's $9.9M Scam Warning
Executive Summary This report details the recent mandate by Google requiring crypto app developers to secure regional licenses in 15...
Aug 17, 20253 min read


Whispers of XZ Utils Backdoor in Legacy Docker Images: Comprehensive Analysis and Mitigation Strategies
Executive Summary The recent discovery dubbed Whispers of XZ Utils Backdoor Live on in Old Docker Images has emerged as a sophisticated...
Aug 17, 20259 min read


North Korean Kimsuky Hackers Exploit BlueKeep Vulnerability in RDP Systems: Comprehensive Data Breach Analysis
Executive Summary Publication Date: August 11, 2025 This report provides a comprehensive technical analysis of the alleged data breach...
Aug 12, 20256 min read
bottom of page
.png)