Blog

Security
Akira Ransomware Breaches SonicWall VPNs — Even on Fully Updated Systems
Akira Ransomware Breaches SonicWall VPNs — Even on Fully Updated Systems The latest wave of Akira ransomware attacks against SonicWall SSL VPNs is a stark reminder: even fully‑patched systems are not immune. First observed in mid‑2025, these attacks have intensified, with evidence pointing to a likely zero‑day vulnerability. The exploitation chain is fast — moving from VPN access to ransomware encryption in a matter of hours. For many organizations, the VPN — once seen as a secure gateway — has become a high‑value target. Key lessons for defenders: Patching is necessary but not sufficient — zero‑days bypass known defenses Layered defenses matter — combine technical controls with user vigilanceMonitor VPN activity closely — watch for unusual logins from VPS providers or unknown geographiesReduce the attack surface — enforce MFA, remove stale accounts, and segment networks The reality: cybersecurity is not a one‑time fix. Threat actors adapt, zero‑days will continue to emerge, and attackers will keep targeting remote access systems.

Security
Scattered Spider Arrests Bring Relief, But Copycat Hackers Sustain the Pressure
Scattered Spider Arrests Slow the Storm — But Copycat Hackers Keep the Threat Alive The recent arrests of members of Scattered Spider offer a welcome pause in their attacks, but it’s far from the end of the story. Copycat actors continue to use the same sophisticated social engineering tactics — phishing, MFA bypass, SIM swaps — to breach even well-defended organizations. For security teams, this is a rare window to reassess defenses. Now is the time to: Review incident response plans, trengthen social engineering defenses, Tighten access controls & network segmentation, Monitor hypervisor environments like VMware ESXi, Expand employee training against real-world attack scenarios No single tool or control can guarantee safety. True resilience comes from a layered defense strategy that combines technology, processes, and people — supported by continuous threat intelligence.

Security
Microsoft Urges Immediate Action: Critical SharePoint RCE Patch Now Available
Critical Microsoft SharePoint Vulnerability Requires Immediate Action Microsoft has released urgent patches for a critical Remote Code Execution (RCE) flaw in SharePoint (CVE-2025-53770), already being actively exploited in the wild. Attackers are chaining this with other known vulnerabilities to gain persistent access—even bypassing MFA and SSO protections. This isn't just another patch cycle. It’s a wake-up call for organizations running on-prem SharePoint. From unsafe deserialization risks to identity control bypasses, the attack surface is growing. And with SharePoint integrated deeply into Microsoft 365 (Teams, OneDrive, Outlook), the potential for lateral compromise is serious. Patching is necessary—but it’s not enough. What’s needed is a layered defense approach: 1. Timely patching and configuration 2. Identity and access monitoring 3. Endpoint detection and response 4. Threat-informed incident readiness 5. Forensic visibility and containment planning

Security
Beyond Backup: Why Cyber Resilience Demands a Rethink in the Age of Ransomware
Is your business still relying on traditional backups to safeguard against ransomware? Our latest blog, “Beyond Backup: Why Cyber Resilience Demands a Rethink in the Age of Ransomware,” highlights why backups alone aren’t enough in today’s threat landscape. Modern ransomware doesn’t just target your data—it targets your ability to recover. From immutable backups and automated recovery testing to orchestrated recovery playbooks, building true cyber resilience requires a shift in strategy.

Security
XORIndex Malware Spread Widens as North Korean Hackers Exploit npm Registry
XORIndex Malware: North Korean Hackers Target npm Registry in Ongoing Supply Chain Attack The open-source community faces a growing challenge: supply chain attacks are no longer rare events but persistent threats. Our latest blog unpacks how North Korean threat actors are exploiting the npm registry with a new malware loader, XORIndex, as part of their broader Contagious Interview campaign. This attack highlights how software dependencies—trusted by developers worldwide—can become backdoors for sophisticated adversaries. The evolving tactics underscore why securing the supply chain is no longer optional.

Security
Over 600 Laravel Apps at Risk of Remote Code Execution Due to Leaked APP_KEYs on GitHub
600+ Laravel Applications Vulnerable to Remote Code Execution Due to Leaked APP_KEYs on GitHub In today’s fast-moving development pipelines, even one leaked secret can turn a secure application into a breach waiting to happen. Security researchers recently uncovered a critical threat: over 600 Laravel applications are exposed to Remote Code Execution (RCE) attacks after sensitive APP_KEYs were found publicly leaked on GitHub. This key isn’t just a string—it’s a gateway into encrypted sessions, authentication flows, and sensitive application data. The incident serves as a stark reminder of the importance of robust secrets management and secure development practices.

Security
Taiwan Flags TikTok, Weibo, RedNote as Data Security Threats Due to China Links
Taiwan Flags TikTok, Weibo, RedNote as Data Security Threats Due to China Links Taiwan’s National Security Bureau has raised serious concerns over China-developed apps like TikTok, Weibo, and RedNote—citing invasive data collection and transmission practices. RedNote failed all 15 security indicators in their assessment, with TikTok and Weibo close behind. These aren’t isolated concerns. Governments across the globe—from India to Canada—are now responding to the broader risks of geopolitical influence through digital platforms.

Security
Escalating Iranian Cyber Threats Target U.S. Defense and Critical Infrastructure
A recent advisory from U.S. cybersecurity and intelligence agencies warns of a growing wave of cyber activity linked to Iranian state-sponsored groups—targeting defense contractors, OT systems, and critical infrastructure.The methods may seem familiar, but their impact is increasingly sophisticated—leveraging reconnaissance tools, remote access trojans, and legitimate admin utilities like PsExec and Mimikatz to quietly move through environments undetected.

Security
Severe Open VSX Vulnerability Opens Door to Supply Chain Attacks
A critical flaw in the Open VSX Registry—used by tools like Gitpod, Google Cloud Shell Editor, and Cursor—has revealed just how vulnerable trusted software ecosystems can be. This vulnerability allowed attackers to exploit the extension publishing workflow, potentially injecting malicious code with broad reach into millions of developer environments.