top of page


Cryptomus Crypto Platform Fined $176M by Canada for Facilitating Cybercrime and Money Laundering
Executive Summary On October 16, 2025, the Financial Transactions and Reports Analysis Centre of Canada ( FINTRAC ) levied a record-breaking administrative monetary penalty of $176,960,190 against Xeltox Enterprises Ltd. , operating as Cryptomus , for 2,593 violations of Canada’s Proceeds of Crime (Money Laundering) and Terrorist Financing Act. Cryptomus , a digital payments platform, was found to have systematically enabled and facilitated cybercrime by supporting dozens of
Oct 235 min read


Surge in Ransomware and DDoS Attacks Targeting Microsoft, WordPress, and Network Appliances in MENA and Africa
Executive Summary The Middle East and Africa (MENA) regions are experiencing a significant escalation in cyberattacks targeting government entities, financial institutions, and small retailers. Threat actors, including both advanced persistent threat (APT) groups and hacktivist collectives, are leveraging sophisticated malware, ransomware-as-a-service (RaaS) platforms, and distributed denial-of-service (DDoS) campaigns. These attacks exploit both zero-day and well-known vulne
Oct 234 min read


Over 250 Magento and Adobe Commerce Stores Compromised via CVE-2025-54236 SessionReaper Vulnerability: Threat Intelligence Report
Executive Summary Over the course of a single night, more than 250 e-commerce sites running Magento and Adobe Commerce were compromised by threat actors exploiting a newly disclosed critical vulnerability, CVE-2025-54236 (dubbed " SessionReaper "). This flaw, which resides in the Adobe Commerce REST API , enables unauthenticated remote code execution and account takeover. Despite the release of a security patch by Adobe over six weeks ago, a significant portion of the glo
Oct 235 min read


SessionReaper (CVE-2025-54236): Active Exploitation of Critical Adobe Magento Vulnerability Threatens E-Commerce Security
Executive Summary A critical vulnerability, designated as SessionReaper (CVE-2024-34102), has been identified in Adobe Magento (also known as Adobe Commerce ), a leading e-commerce platform. This flaw enables unauthenticated remote attackers to hijack active user sessions and, in many cases, achieve full account takeover or remote code execution (RCE) on vulnerable servers. Since the public disclosure and release of proof-of-concept (POC) exploit code, threat actors have ra
Oct 234 min read


Homoglyph Supply Chain Attack Targets NuGet: Fake Netherеum.All Package Steals Ethereum Wallet Keys
Executive Summary A critical supply chain attack has recently targeted the .NET development community through the NuGet package ecosystem. Malicious actors published a counterfeit version of the widely used Nethereum library, leveraging a homoglyph attack by substituting the Latin "e" with a visually identical Cyrillic "е" (Unicode U+0435) in the package name, resulting in Netherеum.All . This subtle manipulation enabled the attackers to deceive developers into integrating
Oct 235 min read


Mysterious Elephant (APT-K-47) Targets South Asian Government Networks With Advanced Custom Malware and Supply Chain Attacks
Executive Summary Publication Date: 2025 The threat landscape in South Asia has been significantly altered by the emergence and evolution of Mysterious Elephant (also known as APT-K-47 ), an advanced persistent threat group first detailed by Kaspersky in 2023. This group has rapidly moved beyond the use of recycled malware, developing custom, modular toolsets and advanced attack chains that primarily target government and diplomatic entities in Pakistan, Bangladesh, and Tur
Oct 164 min read


Jewelbug (Chinese APT) Infiltrates Russian IT Service Provider: Multi-Month Espionage and Supply Chain Attack on Code Repositories and Build Systems
Executive Summary Between January and May 2025, the Chinese advanced persistent threat (APT) group Jewelbug (also known as REF7707 , CL-STA-0049 , and Earth Alux ) infiltrated the network of a Russian IT service provider. The attackers maintained undetected access for approximately five months, targeting the organization’s code repositories and software build systems. This access created the potential for a software supply chain attack against the provider’s customers. Data
Oct 165 min read


Critical SAP NetWeaver AS Java Vulnerability (CVE-2025-42944) Allows Unauthenticated Remote Server Takeover via RMI-P4 Exploit
Executive Summary A newly disclosed critical vulnerability in SAP NetWeaver AS Java (CVE-2025-42944, CVSS 10.0) enables unauthenticated attackers to execute arbitrary operating system commands and potentially seize full control of affected servers—without requiring any login credentials. The flaw, which resides in the RMI-P4 module due to insecure deserialization, is already the subject of active discussion in the global security community. Public exploit code is available,
Oct 164 min read


Fake LastPass and Bitwarden Breach Alerts Used in Phishing Campaign to Hijack PCs via Syncro MSP and ScreenConnect
Executive Summary A new, highly targeted phishing campaign is exploiting the trusted reputations of LastPass and Bitwarden by distributing fraudulent breach alert emails to their user bases. These emails, crafted to appear as urgent security notifications, direct recipients to download a purportedly "secure" desktop application. In reality, the download is a legitimate but abused remote monitoring and management (RMM) tool, specifically the Syncro MSP Agent , which is then
Oct 164 min read


Harvard University Data Breach: Cl0p Ransomware Exploits Oracle E-Business Suite Zero-Day (CVE-2025-61882)
Executive Summary Harvard University has confirmed a data breach resulting from the exploitation of a zero-day vulnerability, CVE-2025-61882 , in the Oracle E-Business Suite (EBS) . The attack, attributed to the Cl0p ransomware group , led to the exfiltration and subsequent leak of approximately 1.3 terabytes of data. The breach was limited to a small administrative unit within the university, with no evidence of compromise to other systems. The incident is part of a broader
Oct 166 min read


Critical Adobe AEM Forms JEE Vulnerability (CVE-2025-54253) Under Active Exploitation: CISA Alerts, Patch Now
Executive Summary The U.S. Cybersecurity and Infrastructure Security Agency ( CISA ) has issued an urgent advisory regarding a critical vulnerability in Adobe Experience Manager (AEM) Forms . This flaw, cataloged as CVE-2024-20767 and assigned a perfect CVSS score of 10.0, enables unauthenticated remote code execution (RCE) on affected systems. The vulnerability is actively being exploited in the wild, with public proof-of-concept (PoC) code available and multiple threat int
Oct 164 min read


OpenSSL September 2025 Vulnerabilities: Critical CVEs Enable Private Key Recovery, Code Execution, and DoS
Executive Summary In September 2025, the OpenSSL Project disclosed three critical vulnerabilities— CVE-2025-9230 , CVE-2025-9231 , and...
Oct 15 min read


KillSec Ransomware Exploits Legacy RDP Vulnerabilities at Brazilian Healthcare Software Provider
Executive Summary Publication Date: 15 September 2025 On 15 September 2025, a prominent Brazilian healthcare software provider confirmed...
Sep 167 min read


FinWise Bank Insider Breach Exposes 689,000 American First Finance Customers Through Credential Mismanagement
Executive Summary Publication Date: September 16, 2025. On September 16, 2025, FinWise Bank experienced an insider breach affecting...
Sep 1610 min read


New Phoenix Attack: Bypassing Rowhammer Defenses in DDR5 Memory Systems
Executive Summary The purpose of this report is to provide our valued customers with a comprehensive analysis of the recently discovered...
Sep 167 min read


WhatsApp Zero-Click Exploit: Emergency Update for iOS and macOS (CVE-2025-55177)
Executive Summary In August 2025, WhatsApp released an emergency security update to address a critical zero-click exploit that has...
Aug 317 min read


Click Studios Patch Mitigates Passwordstate Emergency Access Authentication Bypass Vulnerability Exploited by Advanced Threat Actors
Executive Summary In this report, Click Studios ' recent patch to address a critical authentication bypass vulnerability in the...
Aug 317 min read


Velociraptor Forensic Tool Exploited to Deploy Visual Studio Code for Covert C2 Tunneling: A Cybersecurity Deep Dive
Executive Summary In recent developments within the cybersecurity landscape, threat actors have been observed exploiting the inherent...
Aug 317 min read


Amazon Disrupts APT29 Watering Hole Attack Exploiting Microsoft Device Code Authentication Vulnerability
Executive Summary In a critical cybersecurity development, Amazon has successfully disrupted a sophisticated watering hole campaign...
Aug 316 min read


FTC Urges Tech Firms to Defend Critical Digital Encryption Systems Against Foreign Anti-Encryption Demands
Executive Summary In response to rising regulatory pressures and ongoing debates over encryption practices, recent directives have urged...
Aug 262 min read
bottom of page
.png)