MDR
Managed Detection and Response
Overview
Overview
What to expect
Features
Bring calm and confidence
to your cyber security
Security needs
Security needs
What best describes your current situation?
Overview
Overview
Actively looking for a provider
Unhappy with current provider
Want to augment capabilities
Considering outsourcing
Case study
CymruSOC
Protecting vital public services in Wales by detecting and responding to threats, 24/7
Read more
Resources
All resources
Blogs
Case studies
About
About us
Explore our company and values
Company
Company
Partners
News
Careers
Latest insights
Socura named a top 100 MSSP for MDR in 2025
Read more
Trust, pride and camaraderie: Celebrating Great Place to Work® certification
Read more
Get in touch
Get in touch
Threat
alerts
Stay informed about the latest threats and vulnerabilites
Threat alert
December 11, 2024
Salt Typhoon: Chinese APT Group Targeting Telco Companies
In 2024, threat actor Salt Typhoon (known as “Earth Estries”, “GhostEmperor”, “FamousSparrow”, and “UNC2286”) has been attributed to a series of cyber-attacks targeting U.S. telecommunications companies. The group’s primary focus is cyberespionage and it’s notorious for targeting government entities as well as global organisations including the telecommunications sector. Salt Typhoon exploits internet-facing systems by leveraging living-off-the-land binaries (LOLBINs) like WMIC.exe, PSEXEC.exe for lateral movement and customised malware to establish and maintain persistence.
September 5, 2025
Threat alert
December 11, 2024
Critical Security Updates Released for Ivanti Cloud Services Application (CSA) and Connect Secure Products
Ivanti has issued critical security updates to address multiple vulnerabilities in its Cloud Services Application (CSA) and Connect Secure products. These flaws, if exploited, could lead to privilege escalation and remote code execution (RCE), posing significant risks to organizations relying on these tools.
September 5, 2025
Threat alert
November 19, 2024
CVE-2024-0012: Critical Authentication Bypass Vulnerability in PAN-OS
Palo Alto Networks has identified a critical authentication bypass vulnerability (CVE-2024-0012) affecting its PAN-OS software. This flaw allows unauthenticated attackers with network access to the management web interface to gain administrator privileges. Attackers can further perform administrative actions, and manipulate configurations.
September 5, 2025
Threat alert
October 30, 2024
Midnight Blizzard: Spear-Phishing Campaign Using RDP Files
Threat actor group “Midnight Blizzard” has been recently observed targeting several industries and sectors in a new highly sophisticated spear-phishing campaign that contains a signed Remote Desktop Protocol (RDP) configuration file. This operation targets individuals in government and non-governmental organizations across over 100 entities.
September 5, 2025
Threat alert
October 25, 2024
Critical Vulnerability in FortiManager: CVE-2024-47575
A critical vulnerability has been identified in the FortiManager fgfmd daemon, allowing remote unauthenticated attackers to execute arbitrary code or commands. The missing authentication vulnerability has been actively exploited in the wild, posing a severe risk to organizations using FortiManager and FortiAnalyzer models.
September 5, 2025
Threat alert
October 9, 2024
Ivanti Zero-Day vulnerabilities: CVE-2024-9379, CVE-2024-9380 and CVE-2024-9381
Ivanti issued a security update for three new zero-day vulnerabilities in its Cloud Services Appliance (CSA), which are being reported as exploited. These are tracked under CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381.
September 5, 2025
Threat alert
September 19, 2024
CVE-2024-38812: Critical RCE Bug in VMware vCenter Server
Broadcom has patched a critical vulnerability in VMware vCenter Server, which could allow attackers to achieve remote code execution (RCE) by exploiting a heap overflow flaw in the DCE/RPC (Distributed Computing Environment/Remote Procedure Call) protocol. The vulnerability allows unauthenticated attackers to send specially crafted network packets to unpatched servers, leading to potential system compromise.
September 5, 2025
Threat alert
September 19, 2024
CVE-2024-29847: PoC Released for Critical Ivanti RCE Flaw
February 12, 2025
Threat alert
September 4, 2024
Malware Campaigns: WikiLoader Masquerading as Palo Alto GlobalProtect VPN
Palo Alto’s Unit 42 team has uncovered a WikiLoader loader variant delivered via SEO poisoning and spoofing their GlobalProtect VPN tool. Threat actors exploit users’ trust when downloading software by closely mimicking the legitimate download page. SEO poisoning and malicious ads are increasingly becoming a technique used by attackers to effectively deliver loaders to endpoints. The sophisticated campaign employs two stages: the infection process and leveraging advanced command-and-control (C&C) infrastructure.
September 5, 2025
Previous