Rescana Blog
986 posts | Page 8 of 42

Cybersecurity Incident Analysis
Mustang Panda Targets Government Systems with CoolClient Backdoor and Infostealer Modules in Asia and Eastern Europe

Cybersecurity Incident Analysis
Microsoft Office Zero-Day CVE-2026-21509: Emergency Patch Released for Actively Exploited OLE Vulnerability

Cybersecurity Incident Analysis
Microsoft Office CVE-2026-21509 Zero-Day: Emergency Patch Released to Counter Active Exploitation

Cybersecurity Incident Analysis
CVE-2026-24061: Critical Authentication Bypass in GNU InetUtils telnetd Exposes 800,000 Devices to Remote Root Attacks

Cybersecurity Incident Analysis
CVE-2026-24002: Critical Grist-Core Vulnerability Enables Remote Code Execution via Spreadsheet Formula Sandbox Escape

Cybersecurity Incident Analysis
ClickFix Malware Attacks Targeting Microsoft Windows: Fake CAPTCHAs, Signed Scripts, and Trusted Web Service Exploitation

Cybersecurity Incident Analysis
APT36 (Transparent Tribe) Escalates Cyber-Espionage Against Indian Government and Defense Networks Through Advanced Spear-Phishing and LNK Malware (2024-2025)

CVE Analysis Center
Under Armour Customer Data Breach 2025: Technical Analysis of Everest Ransomware Attack and Exposed Email Addresses

CVE Analysis Center
StackWarp (CVE-2025-29943): Critical SEV-SNP Vulnerability in AMD Zen 1–5 CPUs Exposes Confidential Computing to Privilege Escalation and Key Theft

CVE Analysis Center
Sophisticated Multi-Stage Phishing Attack Exploits Microsoft Windows in Russian Organizations Using Amnesia RAT and Hakuna Matata Ransomware

CVE Analysis Center
Sandworm’s DynoWiper Attack Targeting Polish Combined Heat and Power and Renewable Energy Management Systems: Incident Analysis and Lessons Learned

CVE Analysis Center
Okta SSO Accounts Targeted by Sophisticated Vishing and Adversary-in-the-Middle (AiTM) Phishing Attacks Leading to Data Theft and Extortion

CVE Analysis Center
Konni APT Targets Blockchain Development Environments with AI-Generated PowerShell Malware via Discord Exploits

Technology
ETSI EN 304 223: The New Global Standard for AI Cybersecurity and Supply Chain Risk Management

CVE Analysis Center
CVE-2025-59718/59719: Fortinet FortiCloud SSO Authentication Bypass Actively Exploited on Fully Patched FortiGate Firewalls

CVE Analysis Center
Critical GNU InetUtils telnetd Vulnerability (CVE-2026-24061) Allows Remote Root Access via Authentication Bypass

CVE Analysis Center
Critical Cisco Unified Communications Zero-Day (CVE-2024-20253) Actively Exploited: Millions of Enterprises at Risk

CVE Analysis Center
Comprehensive Analysis of the European Vulnerability Database (EUVD) Launch: Technical Architecture, GCVE Integration, and Cybersecurity Impact

CVE Analysis Center
ATM Jackpotting Attack: Tren de Aragua Gang Exploits Ploutus Malware on Legacy Windows XP ATMs in US, Leading to Multi-State Indictments and Deportations

Active Exploitation Alert
WhisperPair Bluetooth Fast Pair Vulnerability (CVE-2025-36911) Exposes Millions of Audio Accessories to Remote Hijacking, Eavesdropping, and Location Tracking

Active Exploitation Alert
LOTUSLITE Backdoor Targets U.S. Government and Policy Organizations via Venezuela-Themed Spear Phishing: Mustang Panda Cyber-Espionage Campaign Analysis

Active Exploitation Alert
GootLoader Malware Exploits Windows ZIP Handling with 1,000-Part Nested Archives to Evade Detection

Technology
ETSI EN 304 223: Baseline Cybersecurity Standard for AI Models and Systems in Europe

Active Exploitation Alert