top of page


April 2025 Adidas Data Breach: Supply Chain Attack via Third-Party Customer Service Provider
Executive Summary In April 2025, German sportswear giant Adidas fell victim to a cyberattack that compromised customer data through a...
May 283 min read


Rescana Announces Launch of Orion Risk Radar in Japan with FRT and Aspiration
Rescana, in strategic partnership with First Riding Technology (FRT) and Aspiration Japan, has launched Orion Risk Radar in the Japanese mar
May 282 min read


Critical Vulnerabilities in Tenable Network Monitor: Update to Version 6.5.1 to Prevent Exploitation
Executive Summary Tenable's Security Advisory TNS-2025-10 highlights critical vulnerabilities affecting the Tenable Network Monitor ...
May 263 min read


Grafana Security Alert: Critical XSS Vulnerability CVE-2025-4123 - Urgent Patch Required
Executive Summary A major security release has been issued for Grafana addressing a high-severity vulnerability identified as...
May 222 min read


Broadcom Data Breach: Ransomware Attack on Business Systems House Highlights Third-Party Cybersecurity Risks
Executive Summary: In late September 2024, Business Systems House (BSH), a Middle Eastern business partner of ADP used by Broadcom for...
May 183 min read


Ivanti EPMM CVE-2025-4427: Critical Remote Code Execution Vulnerability
Executive Summary The critical vulnerability identified as CVE-2025-4427 affects Ivanti Endpoint Manager Mobile (EPMM) , and allows...
May 162 min read


Critical Vulnerability Alert: Update Your Prisma Access Browser to Protect Against PAN-SA-2025-0009
Rescana Security Advisory Report: PAN-SA-2025-0009 Nosim Vulnerability Vulnerability Overview: Palo Alto Networks has issued a security...
May 154 min read


Critical FortiOS and FortiProxy Zero-Day Vulnerability CVE-2024-55591 Exploited in the Wild
Executive Summary As of January 14, 2025, CVE-2024-55591 has been identified as a critical zero-day vulnerability affecting FortiOS and...
May 143 min read


Patch Now: Secure VMware Tools from Insecure File Handling Vulnerability CVE-2025-22247
Executive Summary The following report delves into a significant cybersecurity vulnerability identified in VMware Tools . This...
May 143 min read


Vulnerabilities in ASUS DriverHub Exposed: CVE-2025-3462 and CVE-2025-3463 Analysis
Executive Summary The latest cybersecurity advisory highlights critical vulnerabilities discovered in ASUS DriverHub , a utility designed...
May 122 min read


Critical Vulnerability Analysis in Cisco IOS XE for WLCs: CVE-2025-20188 Report
Detailed Analysis Report on Cisco Security Advisory: cisco-sa-wlc-file-uplpd-rHZG9UfC Overview The Cisco Security Advisory ID...
May 82 min read


AI Slopsquatting and Supply Chain Risk
Overview The concept of "slopsquatting" emerges from the integration of AI-generated code into software development. As AI tools become...
May 82 min read


Critical Security Update for Elastic's Kibana: CVE-2025-25015
Executive Summary: Elastic has released a critical security update addressing a severe vulnerability in Kibana, a data visualization...
May 82 min read


EvilVideo Zero-Day Vulnerability in Telegram for Android
Introduction: The EvilVideo vulnerability is a zero-day exploit targeting the Telegram app for Android devices. Discovered by ESET...
May 62 min read


xAI Developer's API Key Leak Exposes SpaceX and Tesla's Private LLMs
Incident Report: xAI Developer Leaks API Key for Private SpaceX, Tesla LLMs Executive Summary: A significant security lapse occurred at...
May 63 min read


DragonForce Ransomware Attack on Co-op's IT Networks
Detailed Report on the DragonForce Cyber Attack on Co-op Introduction: The DragonForce cyber attack on Co-op has emerged as a significant...
May 52 min read


Critical Zero-Day Vulnerability in SAP NetWeaver Visual Composer: CVE-2025-31324 Exploited in Manufacturing Attacks
Executive Summary The recent discovery of a zero-day vulnerability in SAP NetWeaver Visual Composer has raised alarm bells across the...
May 23 min read


Defending Cybersecurity Companies from Advanced Threat Actors: Strategies for Mitigating Risks from APT Groups and Ransomware
Executive Summary: Cybersecurity companies have emerged as top-tier targets for sophisticated adversaries, ranging from financially...
May 23 min read


AI-Hallucinated Dependencies in PyPI and npm: The 2025 Slopsquatting Supply Chain Risk Explained
Rescana Cybersecurity Intelligence Report AI Hallucinated Code Dependencies: The Emerging Supply Chain Risk of "Slopsquatting" Prepared...
Apr 213 min read


IBM X-Force 2025 Threat Intelligence Index: Key Insights and What They Mean for Your Organization
IBM X-Force 2025 Threat Intelligence Index: Key Insights and What They Mean for Your Organization
Apr 193 min read
bottom of page
.png)