Rescana Blog
986 posts | Page 21 of 42

Active Exploitation Alert
Samsung Android Secure Boot & Kernel Integrity Patched: CVE-2025-21043 Zero-Day Exploit Fixed

Cybersecurity Incident Analysis
In-Depth Analysis: Supply Chain Poisoning of Popular npm Packages Exploiting event-stream, ua-parser-js, and More

Active Exploitation Alert
CVE-2025-5086 in DELMIA Apriso: Critical Vulnerability Actively Exploited with CISA Warning and Mitigation Strategies

Active Exploitation Alert
Comprehensive Analysis of DELMIA Factory Software Vulnerability Exploited in Cyber Attacks: Trends, Impact, and Mitigation Strategies

General News
SonicWall SSL VPN Vulnerability Exploited by Akira Ransomware: Comprehensive Analysis of Misconfigurations and Critical Exploits

Cybersecurity Incident Analysis
US Offers $10M Reward for Ukrainian Ransomware Operator Targeting Critical Infrastructure Systems

Cybersecurity Incident Analysis
NPM Supply Chain Attack: In-Depth Analysis of the Whimper Exploit on Debug and Chalk Packages

Cybersecurity Incident Analysis
Mitigating CVE-2025-54236: Addressing Adobe Commerce's Critical Input Sanitization Flaw for Customer Account Hijacking

Cybersecurity Incident Analysis
Fortinet FortiGate, Ivanti Connect Secure, and Nvidia GPU Driver Security Updates: In-Depth Vulnerability Exploitation and Mitigation Analysis

Cybersecurity Incident Analysis
Critical SAP NetWeaver (CVSS 10) and SAP S/4HANA Vulnerabilities: APT Exploitation and Urgent Patching Strategies

Technology
Wealthsimple Supply Chain Attack: How Third-Party Software Vulnerabilities Compromised the Wealthsimple Platform

Cybersecurity Incident Analysis
Salesloft GitHub Account Compromise: Detailed Analysis of Internal Credential Breach and Mitigation Strategies

Cybersecurity Incident Analysis
MostereRAT Malware on Windows: Advanced Process Injection and Security Tool Blocking Uncovered

Cybersecurity Incident Analysis
GhostAction GitHub Supply Chain Attack: Hackers Steal 3,325 Secrets from a Critical CI/CD Repository

Technology
Over 6,700 Private Repositories Exposed in Nx Supply Chain Attack: Misconfigured Access Controls Exploited

Technology
Czech Cyber Agency Warns: Chinese Tech Vulnerabilities in Critical Infrastructure Systems and Supply Chains

Cybersecurity Incident Analysis
VirusTotal Exposes 44 Undetected SVG Files Leveraging Base64 Encoding to Deploy Phishing Pages on Web Browsers

Cybersecurity Incident Analysis
SAP S/4HANA CVE-2025-42957 Critical Vulnerability Analysis: Exploitation in the Wild, Impact, and Mitigation Strategies

Cybersecurity Incident Analysis
Rescana Cybersecurity Report: Grok AI Exploits, US Manufacturing Attacks, and Gmail Security Debunked

General News
Sangoma Patches Critical FreePBX Zero-Day Vulnerability Exploited by Hackers – In-Depth Cybersecurity Report

General News
Salesloft Drift Supply Chain Attack Exposes Zscaler & Palo Alto Networks: Technical Analysis and Mitigation Strategies

General News
MystRodX Backdoor Exploits DNS and ICMP to Compromise NetGear ProSafe Series Networks

General News
Lazarus Group Expands Malware Arsenal with PondRAT, ThemeForestRAT, and RemotePE: Threat Analysis on Microsoft Windows and CMS Platforms

General News