| 10/27/2025 |
Three Factors Determine Whether a Ransomware Group is Successful |
Security Boulevard |
| 09/23/2025 |
1H 2025 Threat Intelligence Report (7 publications) |
|
| 09/23/2025 |
New Attack Tactics Look to Bypass MFA and Target Security Blindspots |
Beta News |
| 09/23/2025 |
Threat Actors Turning to MFA Bypass, USB Malware and Supply Chain Attacks |
SC World |
| 09/23/2025 |
Ransomware Retreats, But Cyber Threats Deepen in 2025 |
Information Security Buzz |
| 09/23/2025 |
Identity Attacks and USB Malware Are Rising in 2025, New Report Highlights |
Tech Nadu |
| 09/23/2025 |
Cyber Threats in 2025: Why Identity, Cloud Persistence, and Old-School Malware Still Matter |
Ontinue Resources |
| 09/23/2025 |
Press Release: Ontinue 1H 2025 Threat Intelligence Report Highlights Rise of MFA-Breaking Identity Attacks and Exploitation of Overlooked Gaps |
Ontinue Resources |
| 09/23/2025 |
1H 2025 Threat Intelligence Report |
Ontinue Resources |
| 08/27/2025 |
Infostealers (1 publication) |
|
| 08/27/2025 |
The Silent Smash-and-Grab Driving Modern Cybercrime |
SecurityWeek |
| 07/17/2025 |
Sharepoint ToolShell Exploitation (6 publications) |
|
| 07/22/2025 |
Patch, Persist, Repeat: How ToolShell Is Bypassing SharePoint Defenses |
Security Buzz |
| 07/21/2025 |
Microsoft Rushes Emergency Patch for Actively Exploited SharePoint ‘ToolShell’ Bug |
Dark Reading |
| 07/21/2025 |
Attackers Exploiting Microsoft SharePoint Vulnerabilities |
Channel Futures |
| 07/21/2025 |
ToolShell Exploitation Escalates: Unpatched SharePoint Flaw Opens the Door to Full Server Takeover |
Information Security Buzz |
| 07/21/2025 |
Microsoft Issues Critical Alert on SharePoint Server Flaws CVE-2025-53770 and CVE-2025-53771 |
Tech Nadu |
| 07/17/2025 |
CVE-2025-53770 “ToolShell” – Active SharePoint Zero Day |
Ontinue Resources |
| 07/11/2025 |
SVG Smuggling (12 publications) |
|
| 07/17/2025 |
SMUGGLERS RUN — Hackers are increasingly exploiting scalable vector graphic image files |
PoliticoPro |
| 07/17/2025 |
Stop Treating SVG Image Files as Harmless or be Caught Out in Phishing Attacks |
TechFinitive |
| 07/16/2025 |
Delete Any Emails That Include These Images On Your Phone Or PC |
Forbes.com |
| 07/16/2025 |
Attackers Hide JavaScript in SVG Images to Lure Users to Malicious Sites |
Hack Read |
| 07/16/2025 |
Threat Actors Use SVG Smuggling for Browser-Native Redirection |
Security Week |
| 07/16/2025 |
Clandestine Intrusions Involving SVG Images on the Rise |
SC World |
| 07/15/2025 |
Attackers Hide JavaScript in SVG Images to Lure Users to Malicious Sites |
Hack Read |
| 07/15/2025 |
SVG Smuggling Attacks Elevate Phishing Campaign Techniques, Embedding Malicious JavaScript Code |
Tech Nadu |
| 07/15/2025 |
How Phishers Are Weaponizing SVG Images in Zero-Click, Evasive Campaigns |
CSO Magazine |
| 07/15/2025 |
Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects |
Infosecurity Magazine |
| 07/15/2025 |
Threat Actors Use SVG Smuggling for Browser-Native Redirection |
Security Week |
| 07/11/2025 |
SVG Smuggling – Image Embedded JavaScript Redirect Attacks |
Ontinue Resources |
| 03/25/2025 |
2024 Threat Intelligence Report (45 publications) |
|
| 04/04/2025 |
Security Researchers Identify Generative AI ‘Vishing’ Attack |
THE Journal |
| 04/04/2025 |
Security Researchers Identify Generative AI ‘Vishing’ Attack |
Campus Technology |
| 04/04/2025 |
Hunters International Dumps Ransomware, Goes Full-on Extortion |
Security Boulevard |
| 04/02/2025 |
Threat Actor Using Vishing, MS QuickAssist and Teams Can Potentially Drop Ransomware |
SC Magazine |
| 04/02/2025 |
Veza Launches Identity Partner Program |
MSSP Alert |
| 04/02/2025 |
Hackers Exploit Microsoft Teams Messages to Deliver Malware |
GB Hackers |
| 04/02/2025 |
Hackers Leverage Microsoft Teams Message to Drop Malicious Payload |
Cyber Security News |
| 04/02/2025 |
Security Firm Reveals Voice Phishing Attack Targeting Microsoft Teams |
Redmond Magazine |
| 04/01/2025 |
Microsoft Teams, other tools exploited in new vishing scam |
SC Magazine |
| 04/01/2025 |
Ransomware and Vishing Surge as Attackers Pivot Strategies |
Security Buzz |
| 04/01/2025 |
Ontinue Exposes Attack Exploiting Microsoft Teams, Other Tools |
Channel Futures |
| 04/01/2025 |
Microsoft Teams Users Exploited In Sophisticated Multi-Stage AI Attack |
Forbes |
| 04/01/2025 |
New Phishing Attack Combines Vishing and DLL Sideloading Techniques |
Infosecurity Magazine |
| 04/01/2025 |
Microsoft Teams Vishing Used to Deploy Malware via TeamViewer |
Hack Read |
| 04/01/2025 |
Cybersecurity statistics about cyber security spending, third-party breaches, and SMB threat landscape |
Medium |
| 03/29/2025 |
Weekly Cybertech Roundup: Highlights of the Week |
Cyber Technology Insights |
| 03/27/2025 |
How CIOs Should Prepare Now For Quantum |
Forbes |
| 03/26/2025 |
Beware of Vishint: +132 percent growth in voice phishing attacks |
Sicherheits-berater |
| 03/26/2025 |
Number of voice phishing attacks explodes |
connect professional |
| 03/26/2025 |
Beware of vishing: the number of voice phishing attacks is exploding |
manage it |
| 03/26/2025 |
Beware of vishing: the number of voice phishing attacks is exploding |
IAVC world |
| 03/26/2025 |
Ontinue Releases its 2H 2024 Threat Intelligence Report |
Security IT News |
| 03/26/2025 |
Vishing attacks explode: When your boss calls, but it’s not your boss at all |
Business Punk |
| 03/26/2025 |
Ransomware attacks increase by 132 percent |
ZDnet |
| 03/26/2025 |
Beware of Vishing: Number of voice phishing attacks explodes |
itiko |
| 03/26/2025 |
Ransomware Incidents Increase by 132%, Vishing by 1,633% |
Security Magazine |
| 03/26/2025 |
Ontinue reports 132% surge in ransomware attacks, with AiTM and PlugX RAT increasing as tactics shift |
Industrial Cyber |
| 03/26/2025 |
Risky Bulletin: Cyberattack hits Ukraine’s state railway |
Risky Business |
| 03/26/2025 |
Beware of vishing: The number of voice phishing attacks is rising sharply |
Datensicherheit.de |
| 03/26/2025 |
Beware of Vishing: +132 percent growth in voice phishing attacks |
Dicherheits-berater |
| 03/26/2025 |
Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments |
CyberDefense Wire |
| 03/26/2025 |
Ontinue Report: Ransomware Attacks Surge While Payments Drop |
Continuity Insights |
| 03/25/2025 |
Massive surge in ransomware attacks |
Forbes.com |
| 03/25/2025 |
Beware of vishing: the number of voice phishing attacks is exploding |
topsoft |
| 03/25/2025 |
Ransomware Shifts Tactics as Payouts Drop: Critical Infrastructure in the Crosshairs |
Security Week |
| 03/25/2025 |
Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware |
GBHackers |
| 03/25/2025 |
[Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments]( |
Disaster Recovery Journal |
| 03/25/2025 |
Hackers Deliver Malware via Browser Extensions & Legitimate Tools to Bypass Security Controls |
Cyber Security News |
| 03/25/2025 |
Ontinue Research Reveals Ransomware Attacks Surged 132% Despite 35% Drop in Payments |
Global Fintech Series |
| 03/25/2025 |
Ransomware attacks surge despite payments being down |
BetaNews |
| 03/25/2025 |
If It’s Online and Vulnerable, It’s a Target—Fast |
Ontinue Resources |
| 03/25/2025 |
2024_2H Threat Intelligence Report |
Ontinue Resources |
| 02/26/2025 |
Black Basta Chat Leak (6 publications) |
|
| 03/03/2025 |
Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks |
Forbes.com |
| 03/04/2025 |
Black Basta logs offer peek into its hacking methods |
Smartbrief.com |
| 03/02/2025 |
Ransomware Gang Leak Shows Stolen Passwords And 2FA Codes Driving Attacks |
GrackerAI |
| 02/28/2025 |
Black Basta leak exposes critical ransomware tactics and internal strife, revealing attack patterns |
Industrial Cyber |
| 02/26/2025 |
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations |
Ontinue Resources |
| 02/26/2025 |
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations |
IBM X-Force |
| 02/25/2025 |
Salt Typhoon Attacks (2 publications) |
|
| 03/18/2025 |
Salt Typhoon Exploits Flaw to Breach Major U.S. Telecoms |
SecurityBuzz |
| 02/25/2025 |
Vulnerability Exploited in Salt Typhoon Attack |
Security Magazine |
| 01/30/2025 |
Voyager PHP Admin Panel vulnerability (1 publication) |
|
| 01/30/2025 |
1-click RCE possible by combining vulnerabilities in Voyager PHP |
Security Magazine |
| 01/15/2025 |
Cybersecurity and Threat Intelligence Investments (2 publications) |
|
| 01/15/2025 |
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid |
CSO Online |
| 12/27/2024 |
2025 Cybersecurity predictions (3 publications) |
|
| 01/23/2025 |
Top Cybersecurity Predictions of 2025: Part 1 |
ITProToday |
| 12/27/2024 |
2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope |
SecureWorld |
| 12/31/2024 |
3 Cybercrime Trends Tech Pros Must Watch in 2025 |
DICE Insights |
| 10/30/2024 |
Midnight Blizzard Spear Phishing Intelligence Collection Campaign (4 publications) |
|
| 11/06/2024 |
Russian Midnight Blizzard Spear Phishing Campaign Targets Thousands Using RDP Files |
CPO Magazine |
| 10/31/2024 |
Russian Actor Midnight Blizzard Conducts Massive Spear-Phishing Campaign Using RDP Files |
InformationSecurityBuzz |
| 10/31/2024 |
Microsoft Threat Intelligence Update: How Midnight Blizzard Carried Out Spear-Phishing Using RDP Files |
Cyber Technology Insights |
| 10/30/2024 |
Midnight Blizzard Uses RDP to Target 100 Organizations in US, Europe |
SC World |
| 10/24/2024 |
macOS “HM Surf” vulnerability (CVE-2024-44133) (1 publication) |
|
| 10/24/2024 |
New MacOS vulnerability allows unauthorized data access |
Security Magazine |
| 10/02/2024 |
INC Ransomware attacks against healthcare (1 publication) |
|
| 10/02/2024 |
Security leaders discuss INC ransomware attacks targeting healthcare |
Security Magazine |
| 09/26/2024 |
CUPS(Common Unix Printing System) Remote Code Execution Vulnerabilty Disclosed (4 publications) |
|
| 09/27/2024 |
CUPS vulnerabilities put Linux systems at risk of remote code execution |
SC World |
| 09/27/2024 |
Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected |
Security Week |
| 09/27/2024 |
Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution |
The Hacker News |
| 09/26/2024 |
Customer Advisory: New Remote Code Execution Vulnerability in printing facility (‘CUPS’) commonly found on Linux and similar systems |
Ontinue Resources |
| 09/11/2024 |
Lazarus Targets Developers (1 publication) |
|
| 09/11/2024 |
Lazarus Targets Developers with Sophisticated Coding Test Scam |
Secure World Magazine |
| 09/10/2024 |
1H 2024 Threat Intelligence Report (10 publications) |
|
| 10/31/2024 |
Return from the data fog: Scary security tales for Halloween |
Digital Journal |
| 10/31/2024 |
A Halloween Haunting: Unveiling Cybersecurity’s Scary Stats |
Information Security Buzz |
| 09/19/2024 |
China’s cyberattacks on manufacturing are part of its long-game strategy for industrial dominance |
SC Magazine |
| 09/16/2024 |
Cyberattacks against manufacturing sector increased 105% in H1 of 2024 |
Securitymagazine |
| 09/10/2024 |
Manufacturing, Industrial Sectors Are Under Siege |
Security Boulevard |
| 09/10/2024 |
Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds |
PR Newswire |
| 09/10/2024 |
Attacks Against Manufacturing Industry Increase 105% in First Half of 2024, New Research Finds |
Global Security Mag |
| 09/10/2024 |
Attacks on manufacturing companies up 105 percent |
BetaNews |
| 09/10/2024 |
Key Findings from Ontinue’s 1H 2024 Threat Intelligence Report |
Ontinue Resources |
| 09/10/2024 |
1H 2024 Threat Intelligence Report |
Ontinue Resources |
| 07/25/2024 |
Github’s Stargazers Ghost Network (1 publication) |
|
| 07/25/2024 |
3,000 GitHub accounts found distributing malware |
SC Magazine |
| 06/31/2024 |
VMware ESXi Vulnerability (1 publication) |
|
| 06/31/2024 |
Record-Breaking $75 Million Ransom Paid To Dark Angels Gang |
Forbes.com |
| 04/27/2024 |
Public Talk BSides Cymru 2024 (1 publication) |
|
| 04/27/2024 |
Public Talk: Practical security challenges posed by AI adoption: Code Quality and Threat Modeling |
BSides Cymru, Watch on YouTube(soon) |
| 04/11/2024 |
Raspberry Robin Malware (2 publications) |
|
| 04/11/2024 |
Raspberry Robin Malware Evolves with Sophisticated Evasion Tactics |
Secure World Magazine |
| 04/10/2024 |
Raspberry Robin Observed Spreading via Windows Script Files |
SC Magazine |
| 04/10/2024 |
Expert Panel: Ontinue 2024 Threat Report (1 publication) |
|
| 04/10/2024 |
Expert Panel Discussion |
Ontinue Resources |
| 03/19/2024 |
2023 Threat Intelligence Report (3 publications) |
|
| 03/19/2024 |
End of year Report - 2023 Threat Intelligence Report |
Ontinue Resources |
| 03/19/2024 |
Navigating the Complex Cybersecurity Landscape |
Ontinue Blog |
| 03/19/2024 |
Research Shows IT and Construction Sectors Hardest Hit By Ransomware |
Infosecurity Magazine |
| 03/19/2024 |
Threats Shaping the Cyber Threat Landscape |
VMBlog |
| 03/14/2024 |
Security Data Management (2 publications) |
|
| 03/14/2025 |
How data science in cybersecurity can cut through the fog of war |
ReversingLabs |
| 03/14/2024 |
10 Tips for Better Security Data Management |
DarkReading |
| 02/23/2024 |
Red Teaming GenAI (1 publication) |
|
| 02/23/2024 |
Microsoft Unveils PyRIT, a Red Teaming Tool for Generative AI |
Techstrong.ai |
| 02/16/2024 |
RansomHouse using MrAgent to track deployment accross VMware ESXi hypervisors (1 publication) |
|
| 02/16/2024 |
‘MrAgent’ ransomware tool from RansomHouse Group targets ESXi servers |
SC Magazine |
| 02/08/2024 |
Linux Shim Vulnerability (2 publications) |
|
| 03/29/2024 |
Urgent Response: Linux Developers Swiftly Patch Critical Vulnerability in Shim |
NixOS Pro |
| 02/08/2024 |
Linux Devs Rush to Patch Critical Vulnerability in Shim |
Infosecurity Magazine |
| 01/22/2024 |
Mint SandStorm (5 publications) |
|
| 01/22/2024 |
Constantly Changing Threat Landscape - page 10 |
Channel Futures |
| 01/19/2024 |
Microsoft: Iranian Hackers Evolving Techniques in Espionage Campaigns |
SecureWorld |
| 01/19/2024 |
Iran’s Mint Sandstorm Hits Universities with Hamas-Israel Phishing Scam |
Kilguard.net |
| 01/19/2024 |
Iran’s Mint Sandstorm APT Hits Universities with Hamas-Israel Phishing Scam |
HackRead |
| 01/18/2024 |
Mint Sandstorm targets high-profile Middle East researchers |
SC Magazine |
| 01/13/2024 |
FBot (2 publications) |
|
| 01/13/2024 |
What is FBot? |
Managed Service Provider Association of America |
| 01/12/2024 |
FBot Hacking Tool Targets Major Cloud Services |
SC Magazine |
| 01/13/2024 |
Ivanti Critical Patch (1 publication) |
|
| 01/05/2024 |
Ivanti Patches Critical Flaw in its EPM Software |
SC Magazine |
| 12/21/2023 |
JetBrains TeamCity Supply Chain Attack (1 publication) |
|
| 12/21/2023 |
The JetBrains TeamCity software supply chain attack: Lessons learned |
Security Boulevard |
| 12/21/2023 |
Jetbrains TeamCity Software Supply-chain Attack: A Sunburst Redux |
Reversing Labs |
| 01/10/2023 |
Data Breach Trends and Outlook January 2023 (1 publication) |
|
| 01/10/2023 |
Public Talk: Data Breach Trends and Outlook January 2023 |
ATED ICT Ticino, AIEA, ISACA Switzerland Chapter, ISACA Milan Chapter in collaboration with SUPSI Lugano |