top of page


Gcore Radar Report 2025: Gaming Platforms Under Siege from Sophisticated DDoS Attacks
Executive Summary The recent Gcore radar report highlights a significant shift where the gaming industry has overtaken traditional...
Sep 253 min read


Microsoft Announces Free Windows 10 Security Updates in Europe for Legacy System Protection
Executive Summary Microsoft’s recent initiative to offer free Windows 10 security updates in Europe marks a significant evolution in how...
Sep 252 min read


Feds Tie Scattered Spider Duo to $115M in Ransoms: Legacy System Exploits in Municipal and Financial Networks Uncovered
Executive Summary Publication Date: September 24, 2025 This report provides a detailed, evidence-based analysis of the recent incident...
Sep 259 min read


North Korean Hackers Exploit AkdoorTea Backdoor to Target CryptoDev Toolkit – Comprehensive Cybersecurity Report
Executive Summary In recent months, intelligence sources have observed a sophisticated and concerning evolution in cyber tactics,...
Sep 257 min read


Fortra's Critical Patch Mitigates CVSS 10.0 Remote Code Execution Vulnerability in GoAnywhere MFT
Executive Summary In this advisory, Fortra has released a critical patch addressing a severe vulnerability in GoAnywhere MFT that has...
Sep 228 min read


Unmasking GPT-4-Powered MalTerminal Malware’s Ransomware and Reverse Shell Exploitation
Executive Summary Publication Date: September 21, 2025 In recent breakthroughs uncovered by leading cyber threat researchers, the...
Sep 226 min read


Canada Dismantles TradeOgre Exchange: $40 Million in Cryptocurrency Seized in Landmark Cybersecurity Operation
Executive Summary Publication Date: September 21, 2025. In a dramatic enforcement action that underscores the evolving nature of cyber...
Sep 226 min read


UNC1549 Cyber Attack: LinkedIn Job Lures & MINIBIKE Malware Breach Telecom Remote Management Systems in 11 Firms
Executive Summary The UNC1549 campaign represents an alarming evolution in cyber threat intelligence, demonstrating a sophisticated blend...
Sep 227 min read


ShadowLeak Vulnerability: ChatGPT Deep Research Agent Flaw Enables Invisible Gmail Email Theft
Executive Summary In this advisory report, Rescana presents a comprehensive analysis of the ShadowLeak vulnerability, a zero-click,...
Sep 225 min read


Russian Hackers Gamaredon and Turla Deploy Kazuar Backdoor Against Ukrainian Government Secure Workstation
Executive Summary Recent threat intelligence confirms that state-sponsored actors Gamaredon and Turla have entered into an...
Sep 227 min read


InsightLock Ransomware Breach: How VC Giant Insight Partners’ Critical Systems Were Compromised
Executive Summary Publication Date: September 17, 2025 This advisory report presents a comprehensive examination of the ransomware breach...
Sep 187 min read


Shai-Hulud Worm Targets NPM Ecosystem, Stealing Secrets from 180+ Packages
Executive Summary The recent Shai-Hulud Supply Chain Attack represents one of the most sophisticated assaults on software repositories...
Sep 186 min read


Scattered Spider Resurgence: Financial Sector Targeted with Microsoft Exchange Server Vulnerabilities
Executive Summary This advisory report addresses the alarming resurgence of the threat actor group Scattered Spider with a specific...
Sep 186 min read


KillSec Ransomware Exploits Legacy RDP Vulnerabilities at Brazilian Healthcare Software Provider
Executive Summary Publication Date: 15 September 2025 On 15 September 2025, a prominent Brazilian healthcare software provider confirmed...
Sep 167 min read


FinWise Bank Insider Breach Exposes 689,000 American First Finance Customers Through Credential Mismanagement
Executive Summary Publication Date: September 16, 2025. On September 16, 2025, FinWise Bank experienced an insider breach affecting...
Sep 1610 min read


New Phoenix Attack: Bypassing Rowhammer Defenses in DDR5 Memory Systems
Executive Summary The purpose of this report is to provide our valued customers with a comprehensive analysis of the recently discovered...
Sep 167 min read


In-Depth Analysis: Supply Chain Poisoning of Popular npm Packages Exploiting event-stream, ua-parser-js, and More
Executive Summary In recent months, security researchers have observed a sophisticated supply chain attack targeting highly popular npm ...
Sep 147 min read


Samsung Android Secure Boot & Kernel Integrity Patched: CVE-2025-21043 Zero-Day Exploit Fixed
Executive Summary In the wake of dynamic threat landscapes, Samsung has acted swiftly to mitigate a critical security flaw—...
Sep 145 min read


CVE-2025-5086 in DELMIA Apriso: Critical Vulnerability Actively Exploited with CISA Warning and Mitigation Strategies
Executive Summary In this advisory report we examine the unfolding threat of CVE-2025-5086 in DELMIA Apriso , a pivotal manufacturing...
Sep 146 min read


Comprehensive Analysis of DELMIA Factory Software Vulnerability Exploited in Cyber Attacks: Trends, Impact, and Mitigation Strategies
Executive Summary The purpose of this advisory report is to provide an in-depth technical analysis of the DELMIA Factory Software...
Sep 146 min read
bottom of page
.png)