Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    Chrome Extensions Used for Credential-Stealing and ClickFix Attacks

    Malicious Chrome extensions enterprise users rely on are being abused to steal sessions, impersonate trusted tools, and provide attackers with initial access through social engineering and browser-level compromise.

    Read more
  • article

    LockBit 5.0: The RaaS That Refuses to Go Away

    LockBit 5.0 ransomware marks the group’s attempted resurgence, introducing updated Windows and Linux variants, enhanced anti-analysis features, and a newly launched data leak site with over 100 alleged victims.

    Read more
  • article

    Ransomware Trends & Data Insights: December 2025

    Get the latest ransomware trends and data insights from December 2025.

    Read more
  • article

    An Apple A (Zero) Day

    Apple released patches for two WebKit zero-day vulnerabilities exploited in sophisticated attacks. Users should update devices immediately to stay secure.

    Read more
  • article

    Max-Severity React2Shell Vulnerability

    React2Shell CVE-2025-55182 patch guidance: CVSS 10 flaw in React/Next.js enables unauthenticated RCE. Patch now and monitor suspicious Node.js activity.

    Read more
  • article

    Ransomware Trends & Data Insights: November 2025

    Get the latest Ransomware Trends Data Insights November 2025. November saw the dominance of Akira and Qilin, the rise of 18 unique groups, and AI-augmented attacks.

    Read more
  • article

    Operation Endgame: Season 3

    Operation Endgame Season 3 takedown disrupts Rhadamanthys, VenomRAT, and Elysium, seizing servers, domains, and millions of stolen credentials.

    Read more
  • article

    Google Exposes AI-Powered Malware

    Google has reported the first observed cases of AI-augmented malware used in real-world attacks, marking a new stage in adversarial AI.

    Read more
  • article

    Ransomware Trends & Data Insights: October 2025

    Akira led ransomware activity in October, followed by Qilin. Arete analysts identified key cybercrime trends behind these threat actors.

    Read more
  • article

    New Vidar Stealer 2.0 Upgrades Infostealer Capabilities

    Vidar Stealer 2.0 malware upgrade introduces faster data theft, advanced anti-analysis, and improved credential-stealing techniques.

    Read more
  • article

    Managed File Transfer Exploits: Here to Stay?

    Cybercriminals exploit MFT vulnerabilities in CentreStack and GoAnywhere, enabling remote code execution and access to sensitive data.

    Read more
  • article

    Velociraptor DFIR Tool Used in Ransomware Attacks

    Threat actors exploit outdated Velociraptor DFIR tool versions to deploy ransomware and gain full system control.

    Read more