Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    Coinbase Data Breach Leads to Social Engineering Attacks

    The 2025 Coinbase data breach compromised 70,000 user accounts, exposed sensitive data, and triggered a $20M ransom demand alongside widespread phishing threats.

    Read more
  • article

    LockBit Ransomware Group Suffers Data Breach

    The LockBit ransomware leak 2025 uncovers Bitcoin wallets, ransomware builds, chat logs, and affiliate data, offering deep insight into the group’s tactics.

    Read more
  • article

    SonicWall VPN Flaws Exploited in the Wild

    SonicWall has confirmed active exploitation of two critical SMA100 flaws: CVE-2023-44221 and CVE-2024-38475. Users must patch promptly and review devices for unauthorized access.

    Read more
  • article

    Ransomware Trends & Data Insights: April 2025

    Arete’s April 2025 ransomware trends reveal key threat groups like Play, Qilin, and Akira, plus emerging actors like World Leaks and exploits in CrushFTP.

    Read more
  • article

    Cybercriminals Spread Fog Ransomware Disguised as DOGE Emails

    Cybercriminals use a phishing campaign to spread Fog ransomware, posing as the Department of Government Efficiency (DOGE) to trick users with malicious ZIP files.

    Read more
  • article

    Active Exploitation of File Transfer Vulnerabilities

    Two major vulnerabilities in CrushFTP and Triofox are under active attack, enabling data exfiltration and extortion. Learn how to patch CVE-2025-31161 and CVE-2025-30406 to protect your organization

    Read more
  • article

    Browser Threats Evolve to Distribute Malware Through OneDrive and Microsoft Teams

    Threat actors use a new browser cache smuggling technique to inject malware via OneDrive and Teams, bypassing EDR with DLL proxying and social engineering.

    Read more
  • article

    Ransomware Trends & Data Insights: March 2025

    March 2025 threat analysis reveals Akira-led ransomware trends and new SimpleHelp software flaws. Explore CVE alerts and patch info to stay secure.

    Read more
  • article

    RansomHub Leverages New “Betruger” Backdoor

    Betruger is a custom backdoor used in RansomHub ransomware attacks. It streamlines hacking with built-in tools for keylogging, C2 uploads, and privilege escalation.

    Read more
  • article

    AI Deep Dive Part 3: Understanding Biases & How Threat Actors Use AI

    Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.

    Read more
  • article

    AI Deep Dive Part 2: Data Privacy Concerns

    Protect your data from AI risks. Learn how to safeguard sensitive information, manage AI inputs, and store data securely.

    Read more
  • article

    BianLian

    BianLian extorts victims with aggressive tactics. Learn about its ransom trends, evolving threats, and the FBI’s findings on recent scam letters.

    Read more