top of page


U.S. Judiciary Court Electronic Records Service Breach Investigation: No Evidence of Compromise
Executive Summary Publication Date: August 08, 2025. This advisory report examines the claim regarding a breach of the U.S. Judiciary’s...
Aug 107 min read


GreedyBear Attacks Mozilla Ecosystem: $1M Crypto Stolen via Malicious Firefox Wallet Extensions
Executive Summary Publication Date: 2025-08-08 This advisory report details a comprehensive investigation into the incident involving...
Aug 108 min read


Cisco Vishing Attack: Employee Data Stolen from Cisco IT Support System
Executive Summary Publication Date: August 05, 2025 Cisco confirmed a sophisticated vishing attack targeting a subset of its employees...
Aug 68 min read


Swagger UI 1.0.3 Remote Cross-Site Scripting (XSS) Vulnerability: Comprehensive Analysis, Exploitation Insights, and Mitigation Strategies
Executive Summary This advisory report details the technical evaluation and risk analysis of the Swagger UI version 1.0.3 vulnerability...
Aug 48 min read


CL-STA-0969: Covert Malware Targeting Cisco Unified Communications Manager in Telecom Networks During a 10-Month Espionage Campaign
Executive Summary In the ongoing climate of advanced cyber espionage, the recent incident designated CL-STA-0969 has emerged as a...
Aug 37 min read


FunkSec Ransomware Decryptor Released Free: In-Depth Cybersecurity Analysis for Microsoft Exchange and Windows Systems
Executive Summary In a highly unconventional move within the cybersecurity community, the notorious FunkSec ransomware group, long...
Jul 317 min read


Critical CVE‑2025‑5394 Exploitation of the Alone WordPress Theme Enables Remote Plugin Hijacking
Executive Summary This advisory report presents an in-depth analysis of the recent exploitation of the Alone WordPress theme...
Jul 316 min read


UNC2891 ATM Network Breach: 4G Raspberry Pi Implant Enables CAKETAP Rootkit Exploit
Executive Summary The recent investigation into the UNC2891 breach has revealed a sophisticated attack on ATM networks using a...
Jul 319 min read


Silk Typhoon Patents: Chinese Firms' 15+ AI-Powered Cyber Espionage Tools Targeting Traditional Network Security Systems
Executive Summary This report presents a detailed analysis of the recent patent filings by Chinese firms linked to the Silk Typhoon ...
Jul 302 min read


Google DBSC Open Beta in Chrome Boosts Session Security with Project Zero Patch Transparency
Executive Summary Publication Date: July 26, 2025 This report examines the recent launch of the DBSC Open Beta in Chrome as well as the...
Jul 303 min read


Analyzing a $10.22M Data Breach on Legacy Email Systems: IBM Report Insights into Multi-Stage Cyberattacks
Executive Summary The recent analysis of the “Cost of Data Breach in US Rises to $10.22 Million, Says Latest IBM Report” highlights that...
Jul 307 min read


Toptal GitHub Breach: Attackers Exploit Outdated Authentication to Publish 10 Malicious npm Packages with Over 5,000 Downloads
Executive Summary On 2025-07-22, abnormal activities were detected in the Toptal GitHub organization, and by 2025-07-23 it was confirmed...
Jul 296 min read


Critical Niagara Framework Vulnerabilities: Remote Code Execution and Lateral Movement Threats to Smart Buildings and Industrial Control Systems
Executive Summary This advisory report provides Rescana customers with a thorough analysis of critical vulnerabilities within the Niagara...
Jul 288 min read


Cyber Espionage Exposes Vulnerabilities in Aerospace Communications Suite: In-Depth Analysis of EAGLET Backdoor in the Russian Aerospace Sector
Executive Summary Over the past several months, intelligence sources and reputable OSINT-scraped data have revealed a highly...
Jul 277 min read


Allianz Life Data Breach: 1.4 Million U.S. Customers’ Data Compromised via Cloud CRM System
Executive Summary Publication Date: July 26, 2025. On July 26, 2025, Allianz Life publicly confirmed a significant data breach that has...
Jul 278 min read


SonicWall SMA 100 Critical Vulnerability Patched: In-Depth Analysis of Malware Attacks and Mitigation Strategies
Executive Summary The recent discovery and rapid patching of a critical vulnerability in the SonicWall SMA 100 series has important...
Jul 256 min read


Critical Mitel Authentication Bypass Vulnerability: How Hackers Gain Full Access to MiVoice MX-ONE Systems
Executive Summary In this advisory report, Rescana brings to your immediate attention a severe security vulnerability impacting Mitel ’s...
Jul 257 min read


Stealth Backdoor Exploits in WordPress Mu-Plugins for Persistent Admin Access
Executive Summary Recent investigations conducted by our cybersecurity research team have uncovered a sophisticated threat where...
Jul 247 min read


UK Sanctions Russian Cyber Actors for Assassination-Linked Attacks on Microsoft Office 365 and Exchange Systems
Executive Summary The United Kingdom’s recent imposition of sanctions targeting a network of Russian-affiliated hackers marks a...
Jul 247 min read


Cisco ISE Flaw Enabling Unauthenticated Root Access Exploited by APT Actors
Executive Summary This advisory report provides a detailed analysis of the emerging exploitation trends surrounding the Cisco ISE ...
Jul 226 min read
bottom of page
.png)