top of page


Cyberattack on Iranian Maritime Communication Systems: Exploiting Legacy Software Vulnerabilities with MITRE ATT&CK Techniques
Executive Summary Publication Date: August 22, 2025 In 22 August 2025 an incident was reported by Caliber (https://caliber.az/en/post/c...
Aug 247 min read


DaVita Healthcare Data Breach Analysis: Ransomware Attack Exfiltrates Data of 2.7 Million Patients
Executive Summary Publication Date: August 22, 2025. The incident involving DaVita centers on a reported breach in which a ransomware...
Aug 248 min read


Silk Typhoon Exploits Commvault Vulnerabilities to Breach North American Cloud Infrastructures
Executive Summary The recent rise of advanced attacks from the notorious threat actor known as Silk Typhoon presents a serious threat to...
Aug 246 min read


GeoServer Exploits, PolarEdge Tactics, and the Gayfemboy Push Cybercrime Campaign: A Rescana Cybersecurity Intelligence Report
Executive Summary In recent months, the rapidly evolving cyber threat landscape has witnessed an alarming escalation in the...
Aug 248 min read


APT36 Exploits Linux .desktop Files to Install Malware on Linux Systems
Executive Summary In recent developments, the state-sponsored threat actor APT36 has advanced its operational strategies by exploiting...
Aug 247 min read


Rescana Cybersecurity Report: Linux Servers Targeted by Malware Using Malicious RAR Filenames to Evade Antivirus Detection
Executive Summary Publication Date: 22 August 2025 In recent cybersecurity investigations, a highly sophisticated Linux malware campaign...
Aug 246 min read


DPRK and China Suspected in Hybrid Cyber-Physical Attack on South Korean Embassy’s Diplomatic Communication System
Executive Summary Publication Date: August 21, 2025 In recent developments that have significant implications for geopolitical...
Aug 216 min read


CVE-2025-43300: Critical Apple Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks – Urgent Patch and Mitigation Strategies
Executive Summary The advisory report details the critical vulnerability CVE-2025-43300 , a zero-day exploit affecting Apple products...
Aug 217 min read


High-Severity Vulnerabilities Patched in Google Chrome V8 Engine and Mozilla Firefox Rendering Engine: Exploitation Analysis and Mitigation Strategies
Executive Summary This advisory report presents a comprehensive analysis of high-severity vulnerabilities patched in Google Chrome and...
Aug 206 min read


North Korea Cyber Espionage: GitHub Enterprise Server Attacked via Diplomat IT Worker Scheme Impacting 320+ Firms
Rescana Cyber Security Research Team Executive Summary The recent cyber espionage campaign attributed to North Korean state-sponsored...
Aug 207 min read


U.S. Seizes $2.8M in Crypto from Zeppelin Ransomware Operator Exploiting SolarWinds RDP Proxy Vulnerabilities
Executive Summary Publication Date: August 17, 2025 In a decisive legal and forensic maneuver, U.S. authorities have successfully seized...
Aug 187 min read


Chipmaker Patch Tuesday: Critical Intel Microcode, AMD Firmware & NVIDIA Driver Vulnerabilities Impacting Enterprise Systems
Executive Summary This report provides a comprehensive technical examination of the most recent security patches released on Chipmaker...
Aug 177 min read


Google Mandates 15-Region Crypto App Licensing for Play Store Amid FBI's $9.9M Scam Warning
Executive Summary This report details the recent mandate by Google requiring crypto app developers to secure regional licenses in 15...
Aug 173 min read


Whispers of XZ Utils Backdoor in Legacy Docker Images: Comprehensive Analysis and Mitigation Strategies
Executive Summary The recent discovery dubbed Whispers of XZ Utils Backdoor Live on in Old Docker Images has emerged as a sophisticated...
Aug 179 min read


Microsoft August 2025 Patch Tuesday: Fixing Kerberos Zero-Day in Windows Server Active Directory Systems
Executive Summary In the August 2025 Patch Tuesday update, Microsoft released critical security fixes addressing 111 new...
Aug 136 min read


Manpower Franchise & Headhunting Firm Ransomware Breach: In-Depth Analysis of the 140K UK Data Exposure Incident
Executive Summary Publication Date: August 12, 2025. In this advisory report, we detail the incident involving a ransomware attack...
Aug 137 min read


Charon Ransomware Attacks Middle Eastern Critical Systems with Sophisticated APT-Level Evasion Tactics
Executive Summary Publication Date: August 13, 2025. On August 13, 2025, multiple independent sources confirmed that the Charon Ransomware...
Aug 137 min read


North Korean Kimsuky Hackers Exploit BlueKeep Vulnerability in RDP Systems: Comprehensive Data Breach Analysis
Executive Summary Publication Date: August 11, 2025 This report provides a comprehensive technical analysis of the alleged data breach...
Aug 126 min read


CVE-2025-6543 Exploitation in Citrix Netscaler Devices: Evidence-Based Breach Analysis in the Netherlands
Executive Summary Publication Date: 2025-06-15 This report provides an evidence-based analysis of the exploitation of the CVE-2025-6543 ...
Aug 128 min read


CyberArk and HashiCorp Vault Vulnerabilities: Remote Vault Takeover Without Valid Credentials Analysis
Executive Summary This report provides a detailed technical analysis of critical vulnerabilities found within CyberArk and HashiCorp ...
Aug 106 min read
bottom of page
.png)