MDR
Managed Detection and Response
Overview
Overview
What to expect
Features
Bring calm and confidence
to your cyber security
Security needs
Security needs
What best describes your current situation?
Overview
Overview
Actively looking for a provider
Unhappy with current provider
Want to augment capabilities
Considering outsourcing
Case study
CymruSOC
Protecting vital public services in Wales by detecting and responding to threats, 24/7
Read more
Resources
All resources
Blogs
Case studies
About
About us
Explore our company and values
Company
Company
Partners
News
Careers
Latest insights
Socura shortlisted for Best Customer Service at the SC Awards Europe 2026
Read more
Uniting the UK's approach to cyber: Meet Socura at the NCSS 2026
Read more
Get in touch
Get in touch
Threat
alerts
Stay informed about the latest threats and vulnerabilites
Threat alert
January 22, 2025
Microsoft patches Windows OLE Vulnerability (CVE-2025-21298) and Sophos Highlights Office 365 Threats
n the last Patch Tuesday, Microsoft addressed a high-vulnerability flaw in Microsoft Outlook that could allow attackers to execute remote code via maliciously crafted emails. Similarly, Sophos has observed threat actors leveraging the Office365 suite in attacks such as email bombing, IT impersonation on Teams, and remote control via Quick Assist.
September 5, 2025
Threat alert
January 9, 2025
CVE-2025-0282 & CVE-2025-0283: Ivanti Zero-Day Vulnerabilities
Ivanti disclosed two critical zero-day vulnerabilities affecting its Connect Secure, Policy Secure, and Neurons for ZTA gateways. While the researchers have yet to link the attacks to any advanced persistent threat (APT) group, they have identified several malware samples on compromised systems, including the SPAWN ecosystem of malware as well as newly discovered malware such as a credential harvesting tool called DRYHOOK and a dropper called PHASEJAM.
September 5, 2025
Threat alert
December 11, 2024
Salt Typhoon: Chinese APT Group Targeting Telco Companies
In 2024, threat actor Salt Typhoon (known as “Earth Estries”, “GhostEmperor”, “FamousSparrow”, and “UNC2286”) has been attributed to a series of cyber-attacks targeting U.S. telecommunications companies. The group’s primary focus is cyberespionage and it’s notorious for targeting government entities as well as global organisations including the telecommunications sector. Salt Typhoon exploits internet-facing systems by leveraging living-off-the-land binaries (LOLBINs) like WMIC.exe, PSEXEC.exe for lateral movement and customised malware to establish and maintain persistence.
September 5, 2025
Threat alert
December 11, 2024
Critical Security Updates Released for Ivanti Cloud Services Application (CSA) and Connect Secure Products
Ivanti has issued critical security updates to address multiple vulnerabilities in its Cloud Services Application (CSA) and Connect Secure products. These flaws, if exploited, could lead to privilege escalation and remote code execution (RCE), posing significant risks to organizations relying on these tools.
September 5, 2025
Threat alert
November 19, 2024
CVE-2024-0012: Critical Authentication Bypass Vulnerability in PAN-OS
Palo Alto Networks has identified a critical authentication bypass vulnerability (CVE-2024-0012) affecting its PAN-OS software. This flaw allows unauthenticated attackers with network access to the management web interface to gain administrator privileges. Attackers can further perform administrative actions, and manipulate configurations.
September 5, 2025
Threat alert
October 30, 2024
Midnight Blizzard: Spear-Phishing Campaign Using RDP Files
Threat actor group “Midnight Blizzard” has been recently observed targeting several industries and sectors in a new highly sophisticated spear-phishing campaign that contains a signed Remote Desktop Protocol (RDP) configuration file. This operation targets individuals in government and non-governmental organizations across over 100 entities.
September 5, 2025
Threat alert
October 25, 2024
Critical Vulnerability in FortiManager: CVE-2024-47575
A critical vulnerability has been identified in the FortiManager fgfmd daemon, allowing remote unauthenticated attackers to execute arbitrary code or commands. The missing authentication vulnerability has been actively exploited in the wild, posing a severe risk to organizations using FortiManager and FortiAnalyzer models.
September 5, 2025
Threat alert
October 9, 2024
Ivanti Zero-Day vulnerabilities: CVE-2024-9379, CVE-2024-9380 and CVE-2024-9381
Ivanti issued a security update for three new zero-day vulnerabilities in its Cloud Services Appliance (CSA), which are being reported as exploited. These are tracked under CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381.
September 5, 2025
Threat alert
September 19, 2024
CVE-2024-38812: Critical RCE Bug in VMware vCenter Server
Broadcom has patched a critical vulnerability in VMware vCenter Server, which could allow attackers to achieve remote code execution (RCE) by exploiting a heap overflow flaw in the DCE/RPC (Distributed Computing Environment/Remote Procedure Call) protocol. The vulnerability allows unauthenticated attackers to send specially crafted network packets to unpatched servers, leading to potential system compromise.
September 5, 2025
Previous
Next