Rescana Blog
986 posts | Page 10 of 42

Cybersecurity Incident Analysis
Critical Unauthenticated RCE Vulnerability (CVE-2025-69258) in Trend Micro Apex Central On-Prem Windows Exposes Servers to Full Compromise

Active Exploitation Alert
Critical RCE Vulnerability (CVE-2025-59470) in Veeam Backup & Replication: Patch Released to Prevent Exploitation

Cybersecurity Incident Analysis
BreachForums Hacking Forum Database Leak: Analysis of the 324,000 Account Exposure Incident (January 2026)

Cybersecurity Incident Analysis
Zestix/Sentap Cybercrime Campaign Targets ShareFile, Nextcloud, and OwnCloud via Stolen Credentials: Widespread Data Breaches in 2024-2026

Cybersecurity Incident Analysis
UAC-0184 Exploits Viber for Spearphishing Ukrainian Military and Government with Remcos RAT and Hijack Loader

Cybersecurity Incident Analysis
MongoDB 'MongoBleed' Vulnerability (CVE-2025-14847): Critical Memory Leak Bug Under Active Exploitation – Patch Your Databases Now

Cybersecurity Incident Analysis
Ledger.com Customer Data Exposed in Global-e API Breach: Technical Analysis and Mitigation Recommendations

Cybersecurity Incident Analysis
Kimwolf Android Botnet: Massive Infection of Smart TVs, IoT Devices, and TV Boxes via Exposed ADB and Residential Proxy Networks

Cybersecurity Incident Analysis
Critical n8n Vulnerability (CVE-2025-68613): 9.9 CVSS Authenticated Remote Code Execution Risk and Mitigation Steps

Cybersecurity Incident Analysis
ClickFix Attack Exploits Fake Windows BSOD Screens to Deliver Malware on Windows Systems

Active Exploitation Alert
Transparent Tribe (APT36) Deploys Advanced RAT Attacks Targeting Indian Government and Academic Institutions via LNK and HTA Malware

Active Exploitation Alert
Resecurity Honeypot Incident: Analysis of Scattered Lapsus$ Hunters’ Claimed Breach and Threat Intelligence Effectiveness

Active Exploitation Alert
Kimwolf Botnet: Massive Android TV Box and IoT Malware Threat Exploiting Global Networks

Active Exploitation Alert
Google Cloud Application Integration Exploited in Sophisticated Multi-Stage Phishing Campaign Targeting Microsoft 365 Credentials

Active Exploitation Alert
Covenant Health Qilin Ransomware Breach: Technical Analysis of 2025 Attack Impacting 478,188 Patient Records

Technology
Shai-Hulud 2.0 npm Supply Chain Attack Exposes Trust Wallet: $8.5 Million Stolen in Major Cloud-Native Breach

Technology
RondoDox Botnet Actively Exploits React2Shell Vulnerability (CVE-2025-55182) in Next.js and React Server Components

Technology
European Space Agency JIRA and Bitbucket Breach: Hacker Claims 200GB Data Theft from External Servers

Technology
ErrTraffic: How ClickFix Attacks Exploit Fake Browser Glitches to Compromise WordPress, Joomla, and cPanel Systems

Technology
Critical Vulnerability in IBM API Connect (CVE-2025-13915) Enables Remote Authentication Bypass and Unauthorized Access

Technology
Critical CVE-2025-13915 Authentication Bypass Vulnerability in IBM API Connect: Impact, Exploitation, and Mitigation Guidance

Cybersecurity Incident Analysis
WIRED Database Breach: Over 2.3 Million Subscriber Records Leaked in Condé Nast Cyberattack

Cybersecurity Incident Analysis
Korean Air Employee Data Breach Clop Ransomware Supply Chain Attack Report

Cybersecurity Incident Analysis