MDR
Managed Detection and Response
Overview
Overview
What to expect
Features
Bring calm and confidence
to your cyber security
Security needs
Security needs
What best describes your current situation?
Overview
Overview
Actively looking for a provider
Unhappy with current provider
Want to augment capabilities
Considering outsourcing
Case study
CymruSOC
Protecting vital public services in Wales by detecting and responding to threats, 24/7
Read more
Resources
All resources
Blogs
Case studies
About
About us
Explore our company and values
Company
Company
Partners
News
Careers
Latest insights
Socura named a top 100 MSSP for MDR in 2025
Read more
Trust, pride and camaraderie: Celebrating Great Place to Work® certification
Read more
Get in touch
Get in touch
Threat
alerts
Stay informed about the latest threats and vulnerabilites
Threat alert
January 8, 2026
Veeam RCE Vulnerabilities in Backup & Replication Product
Veeam Software disclosed a suite of critical vulnerabilities impacting its flagship Backup & Replication (VBR) platform. These flaws, most notably CVE-2025-59470 and CVE-2025-55125, facilitate Remote Code Execution (RCE), allowing attackers to compromise the backup infrastructure. A successful exploit provides a centralised hub for data exfiltration and enables attackers to irreversibly encrypt or delete recovery points, effectively neutralising an organisation's ransomware recovery capabilities.
January 8, 2026
Threat alert
December 29, 2025
MacSync Stealer Malware
Jamf Threat Labs has identified a significant evolution in the deployment tactics of the MacSync Stealer malware. Previously reliant on social engineering techniques such as "ClickFix" or "drag-to-terminal" instructions, threat actors have shifted towards a more sophisticated approach. The malware is now being distributed as a code-signed Swift application, significantly increasing its ability to bypass standard macOS security controls.
January 2, 2026
Threat alert
December 18, 2025
SantaStealer Malware-as-a-Service
Rapid7 Labs has uncovered a new, actively developing Malware-as-a-Service (MaaS) threat known as "SantaStealer". Currently promoted via Telegram and underground forums (specifically the Russian-language forum Lolz), this malware is an evolution of the previously identified "BluelineStealer".
December 29, 2025
Threat alert
December 12, 2025
React2Shell (CVE-2025-55182): Technical Analysis & Threat Attribution
CVE-2025-55182 is a critical, unauthenticated RCE in React Server Components affecting React 19.x and Next.js. This unsafe deserialisation flaw is actively exploited by a bifurcated landscape: PRC-linked groups targeting espionage and persistence, alongside cybercriminals deploying ransomware. Post-exploitation tradecraft has escalated rapidly, now featuring novel Linux backdoors like "PeerBlight," WAF evasion, and direct attacks on cloud control planes.
December 29, 2025
Threat alert
December 3, 2025
ClickFix Campaign: Evolution of Social Engineering and Infostealer Distribution
Threat actors are increasingly pivoting toward social engineering strategies, specifically towards the "ClickFix" tactic that tricks users into manually running malicious scripts. This technique effectively circumvents standard perimeter defences, such as "Mark-of-the-Web" (MOTW) controls and browser sandboxes.
December 9, 2025
Threat alert
November 13, 2025
Gootloader Returns: New Evasion Tactics and the Rise of the "GootBot" Supply Chain
After a period of silence, the notorious JavaScript-based malware loader Gootloader has resurfaced according to researchers. Known for compromising legitimate websites to poison search engine results (SEO poisoning), the group has returned with a mature, highly specialized criminal supply chain and a suite of new evasion techniques that challenge traditional detection methods.
November 16, 2025
Threat alert
October 27, 2025
CVE-2025-59287: Unauthenticated RCE in Windows Server Update Services
A critical remote code execution (RCE) vulnerability in Windows Server Update Services (WSUS), tracked as CVE-2025-59287, is under active exploitation. The flaw, caused by an unsafe deserialisation of untrusted data, allows a remote, unauthenticated attacker to gain full NT AUTHORITY\SYSTEM privileges on an affected server. This allows them to push malicious packages disguised as legitimate Microsoft security updates. Worth to note: servers are only vulnerable if the WSUS role is explicitly enabled.
November 3, 2025
Threat alert
October 17, 2025
UPDATE: F5 Security Breach - BrickStorm UNC5221
The intrusion into F5's product development environment was allegedly attributed to another suspected China-nexus actor, UNC5221. A threat cluster specialised in long-term cyber espionage missions with a dwell time of approximately 393 days. In 2023, the threat actor UNC5174 was observed actively exploiting a critical N-day vulnerability (CVE-2023-46747) in F5 BIG-IP appliances to gain initial network access.
October 17, 2025
Threat alert
October 16, 2025
F5 BIG-IP Security Previous Breaches
F5 disclosed a security incident that internal corporate environment had been breached stating that in August 2025 a nation-state threat actor established foothold and maintained long-term, persistent access to specific F5 systems. In previous breaches, threat actor designated UNC5174 leveraged a chain of two vulnerabilities to achieve unauthenticated remote code execution. Their tactics, techniques, and procedures (TTPs) include the deployment of custom, in-memory malware such as the SNOWLIGHT downloader and the GOHEAVY tunneler, which are designed to evade traditional disk-based antivirus and forensic analysis.
October 17, 2025
Next