Rescana Blog
986 posts | Page 23 of 42

Cybersecurity Incident Analysis
Cyberattack on Iranian Maritime Communication Systems: Exploiting Legacy Software Vulnerabilities with MITRE ATT&CK Techniques

Cybersecurity Incident Analysis
APT36 Exploits Linux .desktop Files to Install Malware on Linux Systems

General News
DPRK and China Suspected in Hybrid Cyber-Physical Attack on South Korean Embassy’s Diplomatic Communication System

General News
CVE-2025-43300: Critical Apple Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks – Urgent Patch and Mitigation Strategies

Active Exploitation Alert
North Korea Cyber Espionage: GitHub Enterprise Server Attacked via Diplomat IT Worker Scheme Impacting 320+ Firms

Active Exploitation Alert
High-Severity Vulnerabilities Patched in Google Chrome V8 Engine and Mozilla Firefox Rendering Engine: Exploitation Analysis and Mitigation Strategies

General News
U.S. Seizes $2.8M in Crypto from Zeppelin Ransomware Operator Exploiting SolarWinds RDP Proxy Vulnerabilities

Cybersecurity Incident Analysis
Whispers of XZ Utils Backdoor in Legacy Docker Images: Comprehensive Analysis and Mitigation Strategies

Cybersecurity Incident Analysis
Google Mandates 15-Region Crypto App Licensing for Play Store Amid FBI's $9.9M Scam Warning

CVE Analysis Center
Chipmaker Patch Tuesday: Critical Intel Microcode, AMD Firmware & NVIDIA Driver Vulnerabilities Impacting Enterprise Systems

CVE Analysis Center
Microsoft August 2025 Patch Tuesday: Fixing Kerberos Zero-Day in Windows Server Active Directory Systems

CVE Analysis Center
Manpower Franchise & Headhunting Firm Ransomware Breach: In-Depth Analysis of the 140K UK Data Exposure Incident

CVE Analysis Center
Charon Ransomware Attacks Middle Eastern Critical Systems with Sophisticated APT-Level Evasion Tactics

Cybersecurity Incident Analysis
North Korean Kimsuky Hackers Exploit BlueKeep Vulnerability in RDP Systems: Comprehensive Data Breach Analysis

Cybersecurity Incident Analysis
CVE-2025-6543 Exploitation in Citrix Netscaler Devices: Evidence-Based Breach Analysis in the Netherlands

Cybersecurity Incident Analysis
U.S. Judiciary Court Electronic Records Service Breach Investigation: No Evidence of Compromise

Cybersecurity Incident Analysis
GreedyBear Attacks Mozilla Ecosystem: $1M Crypto Stolen via Malicious Firefox Wallet Extensions

Cybersecurity Incident Analysis
CyberArk and HashiCorp Vault Vulnerabilities: Remote Vault Takeover Without Valid Credentials Analysis

Cybersecurity Incident Analysis
Cisco Vishing Attack: Employee Data Stolen from Cisco IT Support System

Active Exploitation Alert
Swagger UI 1.0.3 Remote Cross-Site Scripting (XSS) Vulnerability: Comprehensive Analysis, Exploitation Insights, and Mitigation Strategies

Active Exploitation Alert
CL-STA-0969: Covert Malware Targeting Cisco Unified Communications Manager in Telecom Networks During a 10-Month Espionage Campaign

Active Exploitation Alert
UNC2891 ATM Network Breach: 4G Raspberry Pi Implant Enables CAKETAP Rootkit Exploit

General News
FunkSec Ransomware Decryptor Released Free: In-Depth Cybersecurity Analysis for Microsoft Exchange and Windows Systems

Active Exploitation Alert