Google details Clop extortion campaign leveraging 0-day in Oracle E-Business Suite

Executive SummaryGoogle Threat Intelligence Group (GTIG) and Mandiant have published an in-depth analysis of the recent extortion campaign orchestrated by Cl0p, exploiting the critical vulnerability CVE-2025-61882 in Oracle E-Business Suite (EBS).Their investigation reveals that initial intrusions date back to August 9, 2025, with suspicious activity detected as early as July 10. The attackers leveraged multiple vulnerabilities in Oracle EBS to gain […]

Google details Clop extortion campaign leveraging 0-day in Oracle E-Business Suite Read More »

Attack Technique: Abuse of the UWP lifecycle and Windows job objects

Attackers are increasingly using sophisticated methods to bypass modern endpoint detection and response (EDR) systems. One such technique involves misusing the application lifecycle of Universal Windows Platform (UWP) applications, combined with Windows job objects, for targeted attacks. This article examines an alternative method of deliberately suspending processes early on to enable attack techniques, such as

Attack Technique: Abuse of the UWP lifecycle and Windows job objects Read More »

ThreatMap Part 3: From data and information to intelligence

Introduction In Cyber Threat Intelligence (CTI), we often use certain words interchangeably. That might feel harmless, but it can blur what we’re actually doing – and sometimes even cause misunderstandings that could lead to bigger problems. One of the most common examples is the mix-up between data, information, and intelligence. These are three very different

ThreatMap Part 3: From data and information to intelligence Read More »

Autonomous Threat Hunting and the role of artificial intelligence (AI)

Introduction The escalating complexity and frequency of cyber threats necessitate a more proactive stance in cybersecurity defense mechanisms. The dynamic nature of cyber threats requires continuous monitoring and analysis, a task that surpasses human capabilities alone. Crucial aspect motivating the adoption of autonomous threat hunting is the imperative need to minimize response times in cyber

Autonomous Threat Hunting and the role of artificial intelligence (AI) Read More »

A Pain in the Mist: Navigating Operation DreamJob’s arsenal

Infection chain The infection chain was initiated by social engineering and a targeted WhatsApp message containing a job-related lure sent to a project engineer. This known social engineering tactic lured the victim to download and open a ZIP archive on its desktop, through the browser-based version of the WhatsApp mobile application (WhatsApp Web).  The archive contained:

A Pain in the Mist: Navigating Operation DreamJob’s arsenal Read More »

Critical vulnerability in React Server Components

A working proof of concept (PoC) code is available for the React2Shell vulnerability and active exploitation by several Chinese-nexus threat groups have been observed. More exploitation across the board is expected as all types of attackers seek to capitalize on this vulnerability.  Patching of the vulnerability must be a priority. Cloud environments such as Akamai,

Critical vulnerability in React Server Components Read More »

Tracking the Fight Against Cybercrime: Global Law Enforcement Trends and What They Reveal About Today’s Threat Landscape

Introduction For organizations navigating an increasingly complex cyber threat landscape, insight into how cybercrime is investigated, disrupted, and prosecuted provides an important perspective on evolving risk and adversary behavior.Cybercrime continues to grow in scale, sophistication, and diversification, placing sustained pressure on law enforcement agencies worldwide. In response, authorities have increased the visibility and frequency of

Tracking the Fight Against Cybercrime: Global Law Enforcement Trends and What They Reveal About Today’s Threat Landscape Read More »

Critical Ivanti EPMM Zero-Days Actively Exploited: What Organizations Need to Know

Two critical zero-day vulnerabilities have been disclosed in Ivanti Endpoint Manager Mobile (EPMM), (formerly known as MobileIron Core), a widely used mobile device management solution. The flaws are already being actively exploited in the wild, prompting urgent mitigation guidance from multiple authorities.  Why This Matters Ivanti EPMM sits at the heart of mobile endpoint security, managing devices, policies, certificates, and authentication mechanisms. A successful

Critical Ivanti EPMM Zero-Days Actively Exploited: What Organizations Need to Know Read More »