Resources
Providing you the latest industry-specific news and insights.
- article
Coinbase Data Breach Leads to Social Engineering Attacks
The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.
Read more - article
LockBit Ransomware Group Suffers Data Breach
The LockBit ransomware leak 2025 uncovers Bitcoin wallets, ransomware builds, chat logs, and affiliate data, offering deep insight into the group’s tactics.
Read more - article
SonicWall VPN Flaws Exploited in the Wild
SonicWall has confirmed active exploitation of two critical SMA100 flaws: CVE-2023-44221 and CVE-2024-38475. Users must patch promptly and review devices for unauthorized access.
Read more - article
Ransomware Trends & Data Insights: April 2025
Arete’s April 2025 ransomware trends reveal key threat groups like Play, Qilin, and Akira, plus emerging actors like World Leaks and exploits in CrushFTP.
Read more - article
Cybercriminals Spread Fog Ransomware Disguised as DOGE Emails
Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.
Read more - article
Active Exploitation of File Transfer Vulnerabilities
Two major vulnerabilities in CrushFTP and Triofox are under active attack, enabling data exfiltration and extortion. Learn how to patch CVE-2025-31161 and CVE-2025-30406 to protect your organization
Read more - article
Browser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams
Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.
Read more - article
Ransomware Trends & Data Insights: March 2025
March 2025 threat analysis reveals Akira-led ransomware trends and new SimpleHelp software flaws. Explore CVE alerts and patch info to stay secure.
Read more - article
RansomHub Leverages New “Betruger” Backdoor
Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.
Read more - article
AI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more - article
AI Deep Dive Part 2: Data Privacy Concerns
Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.
Read more - article
BianLian
BianLian extorts victims with aggressive tactics. Learn about its ransom trends, evolving threats, and the FBI’s findings on recent scam letters.
Read more