Resources
Providing you the latest industry-specific news and insights.
articleChrome Extensions Used for Credential-Stealing and ClickFix Attacks
Malicious Chrome extensions enterprise users rely on are being abused to steal sessions, impersonate trusted tools, and provide attackers with initial access through social engineering and browser-level compromise.
Read more
articleLockBit 5.0: The RaaS That Refuses to Go Away
LockBit 5.0 ransomware marks the group’s attempted resurgence, introducing updated Windows and Linux variants, enhanced anti-analysis features, and a newly launched data leak site with over 100 alleged victims.
Read more
articleRansomware Trends & Data Insights: December 2025
Get the latest ransomware trends and data insights from December 2025.
Read more
articleAn Apple A (Zero) Day
Apple released patches for two WebKit zero-day vulnerabilities exploited in sophisticated attacks. Users should update devices immediately to stay secure.
Read more
articleMax-Severity React2Shell Vulnerability
React2Shell CVE-2025-55182 patch guidance: CVSS 10 flaw in React/Next.js enables unauthenticated RCE. Patch now and monitor suspicious Node.js activity.
Read more
articleRansomware Trends & Data Insights: November 2025
Get the latest Ransomware Trends Data Insights November 2025. November saw the dominance of Akira and Qilin, the rise of 18 unique groups, and AI-augmented attacks.
Read more
articleOperation Endgame: Season 3
Operation Endgame Season 3 takedown disrupts Rhadamanthys, VenomRAT, and Elysium, seizing servers, domains, and millions of stolen credentials.
Read more
articleGoogle Exposes AI-Powered Malware
Google has reported the first observed cases of AI-augmented malware used in real-world attacks, marking a new stage in adversarial AI.
Read more
articleRansomware Trends & Data Insights: October 2025
Akira led ransomware activity in October, followed by Qilin. Arete analysts identified key cybercrime trends behind these threat actors.
Read more
articleNew Vidar Stealer 2.0 Upgrades Infostealer Capabilities
Vidar Stealer 2.0 malware upgrade introduces faster data theft, advanced anti-analysis, and improved credential-stealing techniques.
Read more
articleManaged File Transfer Exploits: Here to Stay?
Cybercriminals exploit MFT vulnerabilities in CentreStack and GoAnywhere, enabling remote code execution and access to sensitive data.
Read more
articleVelociraptor DFIR Tool Used in Ransomware Attacks
Threat actors exploit outdated Velociraptor DFIR tool versions to deploy ransomware and gain full system control.
Read more











