Rescana Blog
986 posts | Page 19 of 42

Active Exploitation Alert
CAPI Backdoor: New .NET Malware Targets Windows Systems in Russian Automotive and E-Commerce Sectors via Phishing ZIP Files

CVE Analysis Center
Mysterious Elephant (APT-K-47) Targets South Asian Government Networks With Advanced Custom Malware and Supply Chain Attacks

CVE Analysis Center
Jewelbug (Chinese APT) Infiltrates Russian IT Service Provider: Multi-Month Espionage and Supply Chain Attack on Code Repositories and Build Systems

CVE Analysis Center
Harvard University Data Breach: Cl0p Ransomware Exploits Oracle E-Business Suite Zero-Day (CVE-2025-61882)

CVE Analysis Center
Fake LastPass and Bitwarden Breach Alerts Used in Phishing Campaign to Hijack PCs via Syncro MSP and ScreenConnect

CVE Analysis Center
Critical SAP NetWeaver AS Java Vulnerability (CVE-2025-42944) Allows Unauthenticated Remote Server Takeover via RMI-P4 Exploit

CVE Analysis Center
Critical Adobe AEM Forms JEE Vulnerability (CVE-2025-54253) Under Active Exploitation: CISA Alerts, Patch Now

Active Exploitation Alert
Pixnapping (CVE-2025-48561): Critical Android Vulnerability Enables Stealthy Theft of 2FA Codes and Sensitive On-Screen Data

Active Exploitation Alert
Oracle E-Business Suite Zero-Day Exploit Leaked by ShinyHunters: CVE-2025-61884 Analysis and Mitigation Guide

Active Exploitation Alert
Microsoft Edge IE Mode Exploited as Backdoor: Zero-Day Vulnerability Forces Emergency Restrictions

Active Exploitation Alert
Malicious Crypto-Stealing VSCode Extensions Target OpenVSX and AI Code Editors: Threat Analysis and Mitigation

Active Exploitation Alert
Flax Typhoon Exploits ArcGIS Servers: Chinese APT Turns SOE Into Persistent Backdoor

Cybersecurity Incident Analysis
F5 BIG-IP Breach 2025: Nation-State Attack Exposes Source Code and Undisclosed Vulnerabilities

Active Exploitation Alert
Comprehensive Analysis of TA585’s MonsterV2 Malware: Attack Chain, Technical Innovations, and Risks to Windows Systems

Cybersecurity Incident Analysis
DraftKings Account Breaches: Credential Stuffing Attacks Expose Customer Data and Financial Risks

Cybersecurity Incident Analysis
BK Technologies IT Systems Breach: Employee Data Compromised in Public Safety Communications Cyberattack (2025)

Cybersecurity Incident Analysis
BatShadow Group Exploits Windows Systems with New Go-Based Vampire Bot Malware Targeting Job Seekers and Digital Marketers

Cybersecurity Incident Analysis
Attackers Season Spam With a Touch of 'Salt' to Bypass Microsoft 365 and Google Workspace Email Security

Cybersecurity Incident Analysis
Asahi Group Holdings Ransomware Attack 2025: Digital Order System Disrupted, Nationwide Beer Shortage in Japan

Active Exploitation Alert
Zimbra CVE-2025-27915 Zero-Day Exploited via Malicious ICS Files to Breach Brazilian Military Systems

Active Exploitation Alert
Chinese Cybercrime Group Exploits IIS Servers Worldwide for SEO Fraud and Credential Theft

Cybersecurity Incident Analysis
SORVEPOTEL Malware: Comprehensive Analysis of Self-Spreading WhatsApp Threat Targeting Windows Systems

Cybersecurity Incident Analysis
Scattered Lapsus$ Hunters Launch Data Leak Site Targeting Salesforce: Massive OAuth Supply Chain Breach Exposes 1 Billion Records

Cybersecurity Incident Analysis