MDR
Managed Detection and Response
Overview
Overview
What to expect
Features
Bring calm and confidence
to your cyber security
Security needs
Security needs
What best describes your current situation?
Overview
Overview
Actively looking for a provider
Unhappy with current provider
Want to augment capabilities
Considering outsourcing
Case study
CymruSOC
Protecting vital public services in Wales by detecting and responding to threats, 24/7
Read more
Resources
All resources
Blogs
Case studies
About
About us
Explore our company and values
Company
Company
Partners
News
Careers
Latest insights
Socura recognised as a top performing scale-up in the UK tech sector
Read more
A wave in cyber: The ascent of cyber security as an essential UK occupation
Read more
Get in touch
Get in touch
Threat
alerts
Stay informed about the latest threats and vulnerabilites
Threat alert
March 19, 2025
Lazarus, MassJacker Malware, StilachiRAT & the Rise of Cryptocurrency Scams
The cryptocurrency world suffered from increasing cyberattacks targeting exchanges, users, and wallets. One of the most notable and recent incidents was the Bybit hack, allegedly orchestrated by the infamous Lazarus. As the industry expands, the number of crypto scams increase, with criminals adapting their sophisticated tactics to deceive users and steal funds. From phishing attacks to fake ICOs, Ponzi schemes, and rug pulls, the variety of scams is as diverse.
September 3, 2025
Threat alert
March 5, 2025
Black Basta Leaked Chats, BackConnect Malware & VMware vulnerabilities
In recent weeks, internal communications from the Black Basta ransomware group have been leaked, revealing crucial information regarding their tactics, techniques, and vulnerabilities exploited during attacks. Security vendors and researchers have since analysed these communications, and one of the most notable findings is a list of 62 CVEs (Common Vulnerabilities and Exposures) that Black Basta has used and continues to exploit in their operations. Notoriously, VMWare has released a new advisory on critical vulnerabilities found in VMware ESXi, Fusion, and other tools.
September 5, 2025
Threat alert
February 19, 2025
Storm-2372: Targeting Microsoft Device Code Authentication
A new phishing campaign, attributed to a threat actor known as Storm-2372, is targeting Microsoft accounts across multiple sectors. Microsoft’s Threat Intelligence Centre believes that Storm-2372 is linked to a nation-state operation that aligns with Russian interests, based on their tradecraft, victimology, and tactics.
September 5, 2025
Threat alert
January 31, 2025
Lumma Infostealer: Delivering Malware via Fake CAPTCHA Pages
In recent years, researchers observed a surge in Information Stealing (Infostealer) malware and their sophistication level. Infostealer’s purpose is to gather sensitive information such as financial data or information stored on a device such as credentials, browser & cookie data, documents and machine details.
September 5, 2025
Threat alert
January 22, 2025
Microsoft patches Windows OLE Vulnerability (CVE-2025-21298) and Sophos Highlights Office 365 Threats
n the last Patch Tuesday, Microsoft addressed a high-vulnerability flaw in Microsoft Outlook that could allow attackers to execute remote code via maliciously crafted emails. Similarly, Sophos has observed threat actors leveraging the Office365 suite in attacks such as email bombing, IT impersonation on Teams, and remote control via Quick Assist.
September 5, 2025
Threat alert
January 9, 2025
CVE-2025-0282 & CVE-2025-0283: Ivanti Zero-Day Vulnerabilities
Ivanti disclosed two critical zero-day vulnerabilities affecting its Connect Secure, Policy Secure, and Neurons for ZTA gateways. While the researchers have yet to link the attacks to any advanced persistent threat (APT) group, they have identified several malware samples on compromised systems, including the SPAWN ecosystem of malware as well as newly discovered malware such as a credential harvesting tool called DRYHOOK and a dropper called PHASEJAM.
September 5, 2025
Threat alert
December 11, 2024
Salt Typhoon: Chinese APT Group Targeting Telco Companies
In 2024, threat actor Salt Typhoon (known as “Earth Estries”, “GhostEmperor”, “FamousSparrow”, and “UNC2286”) has been attributed to a series of cyber-attacks targeting U.S. telecommunications companies. The group’s primary focus is cyberespionage and it’s notorious for targeting government entities as well as global organisations including the telecommunications sector. Salt Typhoon exploits internet-facing systems by leveraging living-off-the-land binaries (LOLBINs) like WMIC.exe, PSEXEC.exe for lateral movement and customised malware to establish and maintain persistence.
September 5, 2025
Threat alert
December 11, 2024
Critical Security Updates Released for Ivanti Cloud Services Application (CSA) and Connect Secure Products
Ivanti has issued critical security updates to address multiple vulnerabilities in its Cloud Services Application (CSA) and Connect Secure products. These flaws, if exploited, could lead to privilege escalation and remote code execution (RCE), posing significant risks to organizations relying on these tools.
September 5, 2025
Threat alert
November 19, 2024
CVE-2024-0012: Critical Authentication Bypass Vulnerability in PAN-OS
Palo Alto Networks has identified a critical authentication bypass vulnerability (CVE-2024-0012) affecting its PAN-OS software. This flaw allows unauthenticated attackers with network access to the management web interface to gain administrator privileges. Attackers can further perform administrative actions, and manipulate configurations.
September 5, 2025
Previous
Next