- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: unit 42
Essential Insights Two threat groups, Cordial Spider and Snarky Spider, affiliated with The Com, are…
Summary Points Researchers warn that BlackFile, an extortion group linked to The Com, uses voice-phishing…
Summary Points Stryker recently experienced a cybersecurity incident involving a malicious file used to conceal…
Summary Points Ransomware negotiation is an unregulated, secretive practice with no standardized industry standards, creating…
Fast Facts Talha Tariq and his team at Vercel responded swiftly to the discovery of…
Fast Facts React2Shell (CVE-2025-55182) is a critical, widely exploited vulnerability disclosed on Dec. 3, impacting…
Top Highlights Security experts report a rapid increase in exploitation attempts of the React2Shell vulnerability,…
Summary Points The React2Shell vulnerability (CVE-2025-55182), affecting React Server Components, was publicly disclosed and quickly…
Fast Facts Attackers are actively exploiting a critical Windows Server Update Services vulnerability (CVE-2025-59287), bypassing…
Top Highlights The "Smishing Triad" phishing operation, managed in Chinese and involving thousands of actors,…