MDR
Managed Detection and Response
Overview
Overview
What to expect
Features
Bring calm and confidence
to your cyber security
Security needs
Security needs
What best describes your current situation?
Overview
Overview
Actively looking for a provider
Unhappy with current provider
Want to augment capabilities
Considering outsourcing
Case study
CymruSOC
Protecting vital public services in Wales by detecting and responding to threats, 24/7
Read more
Resources
All resources
Blogs
Case studies
About
About us
Explore our company and values
Company
Company
Partners
News
Careers
Latest insights
Socura shortlisted for Best Customer Service at the SC Awards Europe 2026
Read more
Uniting the UK's approach to cyber: Meet Socura at the NCSS 2026
Read more
Get in touch
Get in touch
Threat
alerts
Stay informed about the latest threats and vulnerabilites
Threat alert
April 8, 2026
Qilin Ransomware Group
The Qilin ransomware group has recently emerged as one of the most active ransomware operations, executing highly sophisticated campaigns that leverage the "Bring Your Own Vulnerable Driver" (BYOVD) technique. This method is used to systematically disable or bypass endpoint detection and response (EDR) solutions. By side-loading a malicious dynamic-link library (DLL) named msimg32.dll, Qilin initiates a complex, multi-stage infection chain capable of blinding and terminating over 300 different EDR drivers from nearly every security vendor on the market. The group typically gains initial access via stolen credentials and operates methodically, deploying the ransomware payload an average of six days after the initial compromise to maximise impact.
April 8, 2026
Threat alert
March 31, 2026
Axios Supply Chain Attack
A highly critical supply chain attack was identified targeting the axios npm package, a widely utilised HTTP client library. The attack involved the hijack of a lead maintainer’s npm account, which was subsequently used to publish malicious versions of the library. These poisoned releases bypassed established GitHub Actions, CI/CD pipelines, and injected a hidden dependency designed to drop a cross-platform Remote Access Trojan (RAT).
April 7, 2026
Threat alert
March 26, 2026
Citrix NetScaler Vulnerabilities CVE-2026-3055 & CVE-2026-4368
A critical out-of-bounds (OOB) read vulnerability, identified as CVE-2026-3055, has been discovered in Citrix NetScaler ADC and NetScaler Gateway. The vulnerability allows unauthenticated attackers to remotely siphon sensitive data directly from the appliance's memory. A sibling vulnerability (CVE-2026-4368) was also identified, which can cause "session mixup," allowing low-privilege users to hijack high-privilege sessions.
April 7, 2026
Threat alert
March 18, 2026
Storm-2561: Fake VPN Client Campaign
Active since May 2025, the financially motivated cybercriminal group Storm-2561 has been utilising Search Engine Optimisation (SEO) poisoning to distribute counterfeit Virtual Private Network (VPN) clients. The campaign redirects users who are searching for legitimate enterprise VPN software to attacker-controlled websites. This leads to the deployment of digitally signed trojans that masquerade as trusted VPN clients, ultimately designed to harvest sensitive VPN credentials.
March 18, 2026
Threat alert
March 13, 2026
Threat Actor: Handala Hack (Void Manticore)
Unlike traditional state-sponsored espionage actors who remain dormant to ensure long-term intelligence collection, Handala’s operational doctrine is defined by a rapid "disrupt, leak, and amplify" lifecycle. The group prioritises immediate visibility, psychological warfare, and the maximisation of organisational and repetitional damage.
March 13, 2026
Threat alert
February 26, 2026
CVE-2026-20127: Critical Cisco Catalyst SD-WAN Zero Day Vulnerability
CVE-2026-20127 is a critical authentication bypass vulnerability (CVSS Base Score: 10.0) affecting the Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage). The vulnerability has been exploited in the wild as a zero-day since at least 2023 by a highly sophisticated threat actor tracked by Cisco Talos as UAT-8616. This flaw allows an unauthenticated, remote attacker to bypass authentication mechanisms and obtain high-level administrative privileges on affected systems.
March 13, 2026
Threat alert
February 18, 2026
CVE-2026-22769: UNC6201 Exploitation of Dell RecoverPoint for Virtual Machines Zero-Day
Exploitation of CVE-2026-22769, a critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines (CVSS 10.0), represents a tactical pivot by the PRC-nexus threat cluster UNC6201. As organisations strengthen traditional endpoint defenses, this actor has redirected focus toward the "security blind spots" of enterprise infrastructure, providing a quiet environment for high-fidelity espionage.
February 20, 2026
Threat alert
February 13, 2026
CVE-2026-1731: Pre-Authentication Command Injection in BeyondTrust Remote Support and Privileged Remote Access
The disclosure of CVE-2026-1731 marks a significant escalation in the exploitation of unauthenticated remote code execution (RCE) vulnerabilities within enterprise-tier management consoles. The flaw resides in a Java-based deserialisation engine where the absence of a look-ahead object filter allows attackers to inject malicious serialised payloads via the administrative API.
February 16, 2026
Threat alert
February 3, 2026
Notepad++ Supply Chain Compromise (Chrysalis Backdoor)
A coordinated investigation has revealed that the official update infrastructure for Notepad++ was compromised by the state-linked threat actor Lotus Blossom. Between June and December 2025, attackers hijacked the application's update mechanism to deliver a previously undocumented backdoor, identified as Chrysalis, to selected targets. The compromise involved the breach of a hosting provider to redirect update traffic, rather than the alteration of the Notepad++ source code itself.
February 3, 2026
Next