top of page


Orange Group Suffers Major Data Breach: HellCat Ransomware Exploits Jira Vulnerabilities
Executive Summary: The Orange Group suffered a significant data breach involving the theft of 6.5 GB of data from its Romanian branch,...
Feb 262 min read


Critical Security Alert: Addressing the Cisco OpenH264 Codec Library Vulnerability (CVE-2025-27091)
November 15, 2023 Executive Summary The Cisco OpenH264 vulnerability, identified as CVE-2025-27091 , presents a critical security issue...
Feb 253 min read


AI-Driven Espionage: OpenAI Bans ChatGPT Accounts Exploited by Chinese APT Groups in Cyber Spying
Executive Summary An alarming cyber threat has emerged as OpenAI has banned ChatGPT accounts operated by a Chinese group accused of...
Feb 253 min read


In-Depth Exploration of Microsoft's Majorana 1 Quantum Processor: Innovations, Implications, and Future Prospects
Microsoft's Majorana 1 Quantum Processor: A Comprehensive Analysis Technical Details and Core Functionality Microsoft's Majorana 1 is the...
Feb 233 min read


Comprehensive Analysis of Fluent Bit Vulnerabilities CVE-2024-50608 and CVE-2024-50609: Mitigating DoS Risks
Executive Summary This report presents an in-depth examination of vulnerabilities CVE-2024-50608 and CVE-2024-50609 found in Fluent...
Feb 233 min read


Unveiling Black Basta Ransomware Leak: Insights into Operations, Threats, and Cybersecurity Enhancements
Recently, a significant leak of internal chat logs from the Black Basta ransomware gang has surfaced, shedding light on their operations,...
Feb 222 min read


Bybit's $1.5 Billion Crypto Heist: Unraveling the Cold Wallet Security Breach
Executive Summary On February 21, 2025, Bybit, a leading cryptocurrency exchange, experienced a significant security breach resulting in...
Feb 222 min read


SecTopRAT Threat: Malware Distributed via Google Ads Masquerading as Chrome Installer in February 2025
Executive Summary February 2025 marks the emergence of a sophisticated cyber threat as reported by Malwarebytes . Cybercriminals have...
Feb 212 min read


Rescana Cybersecurity Analysis: Combating Storm-2372 Phishing Risks on Microsoft Systems
Executive Summary The Storm-2372 device code phishing campaign presents a notable threat in the cybersecurity landscape, attributed to a...
Feb 203 min read


Salt Typhoon Exploit Campaign: CVE-2023-20198 and CVE-2023-20273 Targeting Cisco Network Devices
Rescan's cybersecurity analysis team has confirmed that the latest exploit campaign orchestrated by the China-backed threat actor Salt...
Feb 147 min read


Addressing the Critical SQL Injection Vulnerability CVE-2025-1094 in PostgreSQL: Risks, Exploitation, and Mitigation Strategies
Executive Summary February 2025 – Today's report details the discovery and exploitation of PostgreSQL Vulnerability CVE-2025-1094 . This...
Feb 147 min read


Critical Remote Code Execution Vulnerability in WinZip: Urgent Mitigation Required for CVE-2025-1240
Executive Summary 2025-02-14 – The disclosure on the ZDI-25-047 advisory provided by the Zero Day Initiative details a severe...
Feb 148 min read


Critical File Upload Vulnerability CVE-2024-13365 in CleanTalk WordPress Plugin Exposes Global Risks
Executive Summary This report outlines the critical risks associated with an unauthenticated arbitrary file upload vulnerability...
Feb 137 min read


Critical Vulnerability CVE-2025-1146: Man-in-the-Middle Threat in CrowdStrike Falcon's Linux Components
Executive Summary February 12, 2025 – Several security observations have brought attention to a critical vulnerability designated as...
Feb 137 min read


Comprehensive CVE-2025-0110 Vulnerability Analysis: Mitigating OS Command Injection Risks in Palo Alto Networks PAN-OS OpenConfig Plugin
Executive Summary Today’s report provides an in-depth evaluation of CVE-2025-0110 , a high-severity OS command injection vulnerability...
Feb 128 min read


Critical CVE-2025-0108 Vulnerability: Authentication Bypass in Palo Alto Networks PAN-OS Management Interface
Executive Summary CVE-2025-0108 is a critical vulnerability affecting Palo Alto NetworksPAN-OS . This advisory report details the...
Feb 127 min read


Mitigating AnyDesk CVE-2024-12754: Essential Strategies for Combating Privilege Escalation Threats
This advisory report outlines critical technical details and mitigation strategies relating to the AnyDesk privilege escalation...
Feb 127 min read


Critical Analysis of CVE-2025-24472: Authentication Bypass Vulnerability in Fortinet's FortiOS and FortiProxy
Executive Summary February 12, 2025 – In today’s advisory update, we present a comprehensive analysis of the recently disclosed...
Feb 126 min read


Japan's Active Cyberdefense Bill: A New Era of Cybersecurity for Critical Infrastructure
Japan is charting a bold course with its Active Cyberdefense Bill. Amid rising concerns over incessant digital incursions, especially...
Feb 73 min read


Microsoft Sysinternals Tools Zero-Day Vulnerability: Critical Threat Analysis and Mitigation Strategies
Executive Summary The following report outlines critical findings related to a zero-day vulnerability discovered in the Microsoft...
Feb 78 min read
bottom of page
.png)