MDR
Managed Detection and Response
Overview
Overview
What to expect
Features
Bring calm and confidence
to your cyber security
Security needs
Security needs
What best describes your current situation?
Overview
Overview
Actively looking for a provider
Unhappy with current provider
Want to augment capabilities
Considering outsourcing
Case study
CymruSOC
Protecting vital public services in Wales by detecting and responding to threats, 24/7
Read more
Resources
All resources
Blogs
Case studies
About
About us
Explore our company and values
Company
Company
Partners
News
Careers
Latest insights
Socura recognised as a top performing scale-up in the UK tech sector
Read more
A wave in cyber: The ascent of cyber security as an essential UK occupation
Read more
Get in touch
Get in touch
Threat
alerts
Stay informed about the latest threats and vulnerabilites
Threat alert
July 22, 2025
CVE-2025-53770 SharePoint Zero-Day Vulnerability and “ToolShell” Campaign
A widespread attack campaign, dubbed “ToolShell,” is actively exploiting a critical zero-day vulnerability in on-premises Microsoft SharePoint Server installations. The vulnerability, tracked as CVE-2025-53770, enables unauthenticated remote code execution (RCE), and allows an attacker to gain complete control of a vulnerable server over the network without requiring any form of authentication or user interaction. Patching alone will not remove the attacker’s access, therefore it is imperative that after applying the emergency security updates, administrators perform a mandatory rotation of the SharePoint MachineKey across all servers in the farm.
September 5, 2025
Threat alert
July 18, 2025
CVE-2025-25257: Pre-Authentication RCE in Fortinet FortiWeb
A critical, unauthenticated SQL injection vulnerability, identified as CVE-2025-25257, has been disclosed in multiple versions of Fortinet’s FortiWeb Web Application Firewall (WAF). The vulnerability allows for the execution of arbitrary SQL commands, which can be escalated to achieve remote code execution (RCE) with the highest possible system privileges (root) on the underlying appliance operating system.
September 5, 2025
Threat alert
July 8, 2025
CVE-2025-20309: Cisco Unified CM Static SSH Credentials Vulnerability
A critical vulnerability, identified as CVE-2025-20309, exists in certain versions of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME). This flaw has been assigned a CVSS score of 10.0, indicating the highest level of severity. The vulnerability permits an unauthenticated, remote attacker to gain complete control of an affected system by logging in with unchangeable, default root credentials.
September 5, 2025
Threat alert
June 27, 2025
CVE-2025-5777 and CVE-2025-6543: Dual Citrix NetScaler Vulnerabilities Demand Immediate Action
Two critical vulnerabilities have been disclosed impacting Citrix NetScaler ADC and NetScaler Gateway products: CVE-2025-5777 and CVE-2025-6543. While both pose significant risks to enterprise infrastructure, CVE-2025-6543 is currently under active exploitation. CVE-2025-5777, dubbed “CitrixBleed 2” is a potential follow-up to the original “CitrixBleed” (CVE-2023-4966), which was extensively exploited by ransomware gangs and other cybercriminals. New reports are mentioning CVE-2025-5777 as being potentially exploited in the wild.
September 5, 2025
Threat alert
June 18, 2025
CVE-2025-23121: Critical RCE in Veeam Backup & Replication
Veeam released a critical security update for its widely used Backup & Replication software, addressing several security flaws out of which CVE-2025-23121 has been identified as a Critical Remote Code Execution (RCE) vulnerability. Vulnerability poses an immediate risk to organizations, particularly those with Veeam Backup Servers joined to an Active Directory domain. Successful exploitation could lead to a complete compromise of backup infrastructure, data loss, potential denial of service, and enabling attackers to move laterally across the network.
September 5, 2025
Threat alert
May 23, 2025
In-the-Wild Exploitation of Ivanti EPMM Vulnerabilities (CVE-2025-4427 & CVE-2025-4428)
Ivanti Endpoint Manager Mobile (EPMM) has been actively exploited due to two critical vulnerabilities: CVE-2025-4427 (an authentication bypass) and CVE-2025-4428 (a remote code execution flaw). These vulnerabilities can enable unauthenticated remote code execution on internet-facing EPMM systems, granting threat actors complete control over compromised instances.
September 5, 2025
Threat alert
May 15, 2025
ClickFix Malware: Campaigns Spread Cross-Platform
A new wave of cyberattacks using the ClickFix social engineering technique is now targeting Linux, expanding from its earlier focus on Windows and macOS. ClickFix deceives users into copying and executing malicious commands under the guise of fixing fake software errors and CAPTCHA tests. It is now used by multiple threat actors to deliver infostealers, remote access trojans, and ransomware.
September 5, 2025
Threat alert
April 23, 2025
CVE-2025-32433: Critical Erlang/OTP SSH Vulnerability
A severe vulnerability, tracked as CVE-2025-32433, has been discovered in the Erlang/OTP SSH implementation and affects all devices running the Erlang/OTP SSH daemon. This flaw allows unauthenticated remote code execution on affected devices. With SSH being a widely used remote access protocol, the vulnerability poses a significant risk, especially in critical infrastructure. Researchers warn that threat actors could soon begin scanning for and exploiting vulnerable systems.
September 5, 2025
Threat alert
March 27, 2025
RedCurl: The Russian-Speaking Cyber Group Expanding Its Tactics with QWCrypt Ransomware
The notorious threat actor RedCurl, renowned for its corporate espionage activities since 2018, has recently pivoted to deploying ransomware specifically targeting Hyper-V virtual machines. Historically, RedCurl’s modus operandi has involved advanced social engineering techniques, such as sending phishing emails with malicious attachments and leveraging legitimate tools like PowerShell to execute malware.
September 5, 2025
Previous
Next