News & updates
On this page we will regularly post content about market intelligence, our own news and updates or major cyber related events which took place in the world. Please let us know if you want us to elaborate on certain topics.
Unpacking UAT-8302: A deep dive into its malware arsenal
Chinese APT Group UAT-8302 Targets Global Government Entities with Sophisticated Malware Cisco Talos has identified UAT-8302, a sophisticated advanced persistent threat (APT) group associated with China, actively targeting government entities in South America and…
Behind the mask: State-sponsored actors in the world of cybersecurity threats
State-Sponsored Cyber Threats and Incident Response Dynamics TL;DR State-sponsored actors exploit the trust assumptions organizations make within their networks, utilizing legitimate credentials and tools to remain undetected. As these adversaries require a different…
Uncovering the persistent threats: Exploitation of Cisco Catalyst SD-WAN vulnerabilities
Exploitation of Authentication Bypass Vulnerability in Cisco SD-WAN Systems TL;DR Talos is monitoring the exploitation of an authentication bypass vulnerability, CVE-2026-20182, affecting Cisco Catalyst SD-WAN Controller and Manager, allowing unauthorized remote…
Get ready: a wave of patching is on the horizon
Surge in Software Vulnerabilities Expected Due to AI Advances The recent Threat Source newsletter from Cisco Talos highlights the dual-edged impact of artificial intelligence on software quality. While AI is set to significantly enhance the detection of bugs in code,…
Unveiling Kimsuky’s latest PebbleDash tools for enhanced cyber operations
Kimsuky Era: Evolving Tactics and Tools in Threat Campaigns TL;DR: Kimsuky, a persistent Korean-speaking threat actor, has expanded its toolbox and tactics, notably adopting VSCode tunneling methods and the Rust programming language. This evolution highlights…
Leveraging CL-STA-1132: Exploiting PAN-OS RCE for stealthy root-level infiltration
Nation-State Threat Actors Target Network Edge Infrastructure Nation-state actors are increasingly compromising network edge infrastructure, particularly firewalls and authentication portals, for covert operations. Recent findings from Palo Alto Networks’ Unit…
Unveiling the secrets: The Gentlemen in cybersecurity – A Check Point Research analysis
Leaked Data from The Gentlemen Ransomware Operation Exposes Operational Insights TL;DR: On May 4, 2026, a database leak from The Gentlemen ransomware-as-a-service group unveiled details about their operations, including internal communications and victim negotiation…
A Shai-Hulud-inspired npm worm targets @tanstack: What you need to know
Npm Package Compromise Exposes GitHub Credentials and Cloud Secrets Multiple npm packages have been compromised, resulting in a series of attacks that harvest GitHub credentials and cloud secrets. The researcher behind this analysis highlighted vulnerabilities within…
Defending through disruption: Philippe Laulheret on the art of cybersecurity
Insights into Ethical Hacking and Vulnerability Research TL;DR Philippe Laulheret, a Senior Vulnerability Researcher, discusses the importance of ethical hacking in identifying security flaws before they can be exploited. His approach integrates personal passion and…
Microsoft’s May 2026 Patch Tuesday: Addressing 120 vulnerabilities for enhanced DNS security and beyond
Major Microsoft Patch Tuesday Update Addresses Critical Vulnerabilities TL;DR In May 2026, Microsoft released updates addressing 120 vulnerabilities, including 17 classified as critical. Notably, these updates impact multiple high-risk enterprise components,…
May 2026 Microsoft Patch Tuesday: Key vulnerabilities and Snort rule updates you need to know
Microsoft Addresses 137 Vulnerabilities in May 2026 Security Update Microsoft has issued its May 2026 security update, addressing 137 vulnerabilities across various products, with 31 categorized as critical. While none of these vulnerabilities are currently exploited…
From filemanager to frenzy: The rapid spread of MrRot_13’s cPanel DNS exploitation campaign
Active Exploitation Campaign Targeting cPanel Vulnerability CVE-2026-41940 TL;DR: Researchers attribute an ongoing exploitation campaign to the threat actor Mr_Rot13, targeting the critical cPanel authentication bypass vulnerability CVE-2026-41940. The campaign…















