07/17/2025 |
Sharepoint ToolShell Exploitation |
|
07/22/2025 |
Patch, Persist, Repeat: How ToolShell Is Bypassing SharePoint Defenses |
Security Buzz |
07/21/2025 |
Microsoft Rushes Emergency Patch for Actively Exploited SharePoint ‘ToolShell’ Bug |
Dark Reading |
07/21/2025 |
Attackers Exploiting Microsoft SharePoint Vulnerabilities |
Channel Futures |
07/21/2025 |
ToolShell Exploitation Escalates: Unpatched SharePoint Flaw Opens the Door to Full Server Takeover |
Information Security Buzz |
07/21/2025 |
Microsoft Issues Critical Alert on SharePoint Server Flaws CVE-2025-53770 and CVE-2025-53771 |
Tech Nadu |
07/17/2025 |
CVE-2025-53770 “ToolShell” – Active SharePoint Zero Day |
Ontinue Resources |
07/11/2025 |
SVG Smuggling |
|
07/17/2025 |
SMUGGLERS RUN — Hackers are increasingly exploiting scalable vector graphic image files |
PoliticoPro |
07/17/2025 |
Stop Treating SVG Image Files as Harmless or be Caught Out in Phishing Attacks |
TechFinitive |
07/16/2025 |
Delete Any Emails That Include These Images On Your Phone Or PC |
Forbes.com |
07/16/2025 |
Attackers Hide JavaScript in SVG Images to Lure Users to Malicious Sites |
Hack Read |
07/16/2025 |
Threat Actors Use SVG Smuggling for Browser-Native Redirection |
Security Week |
07/16/2025 |
Clandestine Intrusions Involving SVG Images on the Rise |
SC World |
07/15/2025 |
Attackers Hide JavaScript in SVG Images to Lure Users to Malicious Sites |
Hack Read |
07/15/2025 |
SVG Smuggling Attacks Elevate Phishing Campaign Techniques, Embedding Malicious JavaScript Code |
Tech Nadu |
07/15/2025 |
How Phishers Are Weaponizing SVG Images in Zero-Click, Evasive Campaigns |
CSO Magazine |
07/15/2025 |
Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects |
Infosecurity Magazine |
07/15/2025 |
Threat Actors Use SVG Smuggling for Browser-Native Redirection |
Security Week |
07/11/2025 |
SVG Smuggling – Image Embedded JavaScript Redirect Attacks |
Ontinue Resources |
03/25/2025 |
2024 Threat Intelligence Report (45 publications) |
|
04/04/2025 |
Security Researchers Identify Generative AI ‘Vishing’ Attack |
THE Journal |
04/04/2025 |
Security Researchers Identify Generative AI ‘Vishing’ Attack |
Campus Technology |
04/04/2025 |
Hunters International Dumps Ransomware, Goes Full-on Extortion |
Security Boulevard |
04/02/2025 |
Threat Actor Using Vishing, MS QuickAssist and Teams Can Potentially Drop Ransomware |
SC Magazine |
04/02/2025 |
Veza Launches Identity Partner Program |
MSSP Alert |
04/02/2025 |
Hackers Exploit Microsoft Teams Messages to Deliver Malware |
GB Hackers |
04/02/2025 |
Hackers Leverage Microsoft Teams Message to Drop Malicious Payload |
Cyber Security News |
04/02/2025 |
Security Firm Reveals Voice Phishing Attack Targeting Microsoft Teams |
Redmond Magazine |
04/01/2025 |
Microsoft Teams, other tools exploited in new vishing scam |
SC Magazine |
04/01/2025 |
Ransomware and Vishing Surge as Attackers Pivot Strategies |
Security Buzz |
04/01/2025 |
Ontinue Exposes Attack Exploiting Microsoft Teams, Other Tools |
Channel Futures |
04/01/2025 |
Microsoft Teams Users Exploited In Sophisticated Multi-Stage AI Attack |
Forbes |
04/01/2025 |
New Phishing Attack Combines Vishing and DLL Sideloading Techniques |
Infosecurity Magazine |
04/01/2025 |
Microsoft Teams Vishing Used to Deploy Malware via TeamViewer |
Hack Read |
04/01/2025 |
Cybersecurity statistics about cyber security spending, third-party breaches, and SMB threat landscape |
Medium |
03/29/2025 |
Weekly Cybertech Roundup: Highlights of the Week |
Cyber Technology Insights |
03/27/2025 |
How CIOs Should Prepare Now For Quantum |
Forbes |
03/26/2025 |
Beware of Vishint: +132 percent growth in voice phishing attacks |
Sicherheits-berater |
03/26/2025 |
Number of voice phishing attacks explodes |
connect professional |
03/26/2025 |
Beware of vishing: the number of voice phishing attacks is exploding |
manage it |
03/26/2025 |
Beware of vishing: the number of voice phishing attacks is exploding |
IAVC world |
03/26/2025 |
Ontinue Releases its 2H 2024 Threat Intelligence Report |
Security IT News |
03/26/2025 |
Vishing attacks explode: When your boss calls, but it’s not your boss at all |
Business Punk |
03/26/2025 |
Ransomware attacks increase by 132 percent |
ZDnet |
03/26/2025 |
Beware of Vishing: Number of voice phishing attacks explodes |
itiko |
03/26/2025 |
Ransomware Incidents Increase by 132%, Vishing by 1,633% |
Security Magazine |
03/26/2025 |
Ontinue reports 132% surge in ransomware attacks, with AiTM and PlugX RAT increasing as tactics shift |
Industrial Cyber |
03/26/2025 |
Risky Bulletin: Cyberattack hits Ukraine’s state railway |
Risky Business |
03/26/2025 |
Beware of vishing: The number of voice phishing attacks is rising sharply |
Datensicherheit.de |
03/26/2025 |
Beware of Vishing: +132 percent growth in voice phishing attacks |
Dicherheits-berater |
03/26/2025 |
Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments |
CyberDefense Wire |
03/26/2025 |
Ontinue Report: Ransomware Attacks Surge While Payments Drop |
Continuity Insights |
03/25/2025 |
Massive surge in ransomware attacks |
Forbes.com |
03/25/2025 |
Beware of vishing: the number of voice phishing attacks is exploding |
topsoft |
03/25/2025 |
Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs |
Security Week |
03/25/2025 |
Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware |
GBHackers |
03/25/2025 |
[Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments]( |
Disaster Recovery Journal |
03/25/2025 |
Hackers Deliver Malware via Browser Extensions & Legitimate Tools to Bypass Security Controls |
Cyber Security News |
03/25/2025 |
Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments |
Global Fintech Series |
03/25/2025 |
Ransomware attacks surge despite payments being down |
BetaNews |
03/25/2025 |
If It’s Online and Vulnerable, It’s a Target—Fast |
Ontinue Resources |
03/25/2025 |
2024_2H Threat Intelligence Report |
Ontinue Resources |
02/26/2025 |
Black Basta Chat Leak (6 publications) |
|
03/03/2025 |
Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks |
Forbes.com |
03/04/2025 |
Black Basta logs offer peek into its hacking methods |
Smartbrief.com |
03/02/2025 |
Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks |
GrackerAI |
02/28/2025 |
Black Basta leak exposes critical ransomware tactics and internal strife, revealing attack patterns |
Industrial Cyber |
02/26/2025 |
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations |
Ontinue Resources |
02/26/2025 |
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations |
IBM X-Force |
02/25/2025 |
Salt Typhoon Attacks (2 publications) |
|
03/18/2025 |
Salt Typhoon Exploits Flaw to Breach Major U.S. Telecoms |
SecurityBuzz |
02/25/2025 |
Vulnerability Exploited in Salt Typhoon Attack |
Security Magazine |
01/30/2025 |
Voyager PHP Admin Panel vulnerability (1 publication) |
|
01/30/2025 |
1-click RCE possible by combining vulnerabilities in Voyager PHP |
Security Magazine |
01/15/2025 |
Cybersecurity and Threat Intelligence Investments (2 publications) |
|
01/15/2025 |
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid |
CSO Online |
12/27/2024 |
2025 Cybersecurity predictions (3 publications) |
|
01/23/2025 |
Top Cybersecurity Predictions of 2025: Part 1 |
ITProToday |
12/27/2024 |
2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope |
SecureWorld |
12/31/2024 |
3 Cybercrime Trends Tech Pros Must Watch in 2025 |
DICE Insights |
10/30/2024 |
Midnight Blizzard Spear Phishing Intelligence Collection Campaign (4 publications) |
|
11/06/2024 |
Russian Midnight Blizzard Spear Phishing Campaign Targets Thousands Using RDP Files |
CPO Magazine |
10/31/2024 |
Russian Actor Midnight Blizzard Conducts Massive Spear-Phishing Campaign Using RDP Files |
InformationSecurityBuzz |
10/31/2024 |
Microsoft Threat Intelligence Update: How Midnight Blizzard Carried Out Spear-Phishing Using RDP Files |
Cyber Technology Insights |
10/30/2024 |
Midnight Blizzard Uses RDP to Target 100 Organizations in US, Europe |
SC World |
10/24/2024 |
macOS “HM Surf” vulnerability (CVE-2024-44133) (1 publication) |
|
10/24/2024 |
New MacOS vulnerability allows unauthorized data access |
Security Magazine |
10/02/2024 |
INC Ransomware attacks against healthcare (1 publication) |
|
10/02/2024 |
Security leaders discuss INC ransomware attacks targeting healthcare |
Security Magazine |
09/26/2024 |
CUPS(Common Unix Printing System) Remote Code Execution Vulnerabilty Disclosed (4 publications) |
|
09/27/2024 |
CUPS vulnerabilities put Linux systems at risk of remote code execution |
SC World |
09/27/2024 |
Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected |
Security Week |
09/27/2024 |
Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution |
The Hacker News |
09/26/2024 |
Customer Advisory: New Remote Code Execution Vulnerability in printing facility (‘CUPS’) commonly found on Linux and similar systems |
Ontinue Resources |
09/11/2024 |
Lazarus Targets Developers (1 publication) |
|
09/11/2024 |
Lazarus Targets Developers with Sophisticated Coding Test Scam |
Secure World Magazine |
09/10/2024 |
1H 2024 Threat Intelligence Report (10 publications) |
|
10/31/2024 |
Return from the data fog: Scary security tales for Halloween |
Digital Journal |
10/31/2024 |
A Halloween Haunting: Unveiling Cybersecurity’s Scary Stats |
Information Security Buzz |
09/19/2024 |
China’s cyberattacks on manufacturing are part of its long-game strategy for industrial dominance |
SC Magazine |
09/16/2024 |
Cyberattacks against manufacturing sector increased 105% in H1 of 2024 |
Securitymagazine |
09/10/2024 |
Manufacturing, Industrial Sectors Are Under Siege |
Security Boulevard |
09/10/2024 |
Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds |
PR Newswire |
09/10/2024 |
Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds |
Global Security Mag |
09/10/2024 |
Attacks on manufacturing companies up 105 percent |
BetaNews |
09/10/2024 |
Key Findings from Ontinue’s 1H 2024 Threat Intelligence Report |
Ontinue Resources |
09/10/2024 |
1H 2024 Threat Intelligence Report |
Ontinue Resources |
07/25/2024 |
Github’s Stargazers Ghost Network (1 publication) |
|
07/25/2024 |
3,000 GitHub accounts found distributing malware |
SC Magazine |
06/31/2024 |
VMware ESXi Vulnerability (1 publication) |
|
06/31/2024 |
Record-Breaking $75 Million Ransom Paid To Dark Angels Gang |
Forbes.com |
04/27/2024 |
Public Talk BSides Cymru 2024 (1 publication) |
|
04/27/2024 |
Public Talk: Practical security challenges posed by AI adoption: Code Quality and Threat Modeling |
BSides Cymru, Watch on YouTube(soon) |
04/11/2024 |
Raspberry Robin Malware (2 publications) |
|
04/11/2024 |
Raspberry Robin Malware Evolves with Sophisticated Evasion Tactics |
Secure World Magazine |
04/10/2024 |
Raspberry Robin Observed Spreading via Windows Script Files |
SC Magazine |
04/10/2024 |
Expert Panel: Ontinue 2024 Threat Report (1 publication) |
|
04/10/2024 |
Expert Panel Discussion |
Ontinue Resources |
03/19/2024 |
2023 Threat Intelligence Report (3 publications) |
|
03/19/2024 |
End of year Report - 2023 Threat Intelligence Report |
Ontinue Resources |
03/19/2024 |
Navigating the Complex Cybersecurity Landscape |
Ontinue Blog |
03/19/2024 |
Research Shows IT and Construction Sectors Hardest Hit By Ransomware |
Infosecurity Magazine |
03/19/2024 |
Threats Shaping the Cyber Threat Landscape |
VMBlog |
03/14/2024 |
Security Data Management (2 publications) |
|
03/14/2025 |
How data science in cybersecurity can cut through the fog of war |
ReversingLabs |
03/14/2024 |
10 Tips for Better Security Data Management |
DarkReading |
02/23/2024 |
Red Teaming GenAI (1 publication) |
|
02/23/2024 |
Microsoft Unveils PyRIT, a Red Teaming Tool for Generative AI |
Techstrong.ai |
02/16/2024 |
RansomHouse using MrAgent to track deployment accross VMware ESXi hypervisors (1 publication) |
|
02/16/2024 |
‘MrAgent’ ransomware tool from RansomHouse Group targets ESXi servers |
SC Magazine |
02/08/2024 |
Linux Shim Vulnerability (2 publications) |
|
03/29/2024 |
Urgent Response: Linux Developers Swiftly Patch Critical Vulnerability in Shim |
NixOS Pro |
02/08/2024 |
Linux Devs Rush to Patch Critical Vulnerability in Shim |
Infosecurity Magazine |
01/22/2024 |
Mint SandStorm (5 publications) |
|
01/22/2024 |
Constantly Changing Threat Landscape - page 10 |
Channel Futures |
01/19/2024 |
Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns |
SecureWorld |
01/19/2024 |
Iran’s Mint Sandstorm Hits Universities with Hamas-Israel Phishing Scam |
Kilguard.net |
01/19/2024 |
Iran’s Mint Sandstorm APT Hits Universities with Hamas-Israel Phishing Scam |
HackRead |
01/18/2024 |
Mint Sandstorm targets high-profile Middle East researchers |
SC Magazine |
01/13/2024 |
FBot (2 publications) |
|
01/13/2024 |
What is FBot? |
Managed Service Provider Association of America |
01/12/2024 |
FBot Hacking Tool Targets Major Cloud Services |
SC Magazine |
01/13/2024 |
Ivanti Critical Patch (1 publication) |
|
01/05/2024 |
Ivanti Patches Critical Flaw in its EPM Software |
SC Magazine |
12/21/2023 |
JetBrains TeamCity Supply Chain Attack (1 publication) |
|
12/21/2023 |
The JetBrains TeamCity software supply chain attack: Lessons learned |
Security Boulevard |
12/21/2023 |
Jetbrains TeamCity Software Supply-chain Attack: A Sunburst Redux |
Reversing Labs |
01/10/2023 |
Data Breach Trends and Outlook January 2023 (1 publication) |
|
01/10/2023 |
Public Talk: Data Breach Trends and Outlook January 2023 |
ATED ICT Ticino, AIEA, ISACA Switzerland Chapter, ISACA Milan Chapter in collaboration with SUPSI Lugano |