Ransomware Negotiator Caught Distributing Ransomware: How Insider Knowledge Became a Weapon
It finally happened a trusted ransomware negotiator has been indicted for doing exactly what many in cybersecurity suspected would happen, deploying ransomware themselves. But this isn’t just a betrayal of trust it’s...
Read MoreSSRF Real Cookie Banner Vulnerability discovery – CVE-2025-12136
During a client engagement we recently identified a Server-Side Request Forgery (SSRF) vulnerability affecting all versions of the Real Cookie Banner WordPress plugin up to and including v5.2.4. The plugin provides cookie...
Read MoreStorm0501: As Enterprises Move to the Cloud, So Do the Criminals
Microsoft Threat Intelligence has observed a financially motivated cyber-threat actor, tracked as Storm-0501, shifting its playbook to exploit cloud environments. Once a on-premises attacker, the group now prioritizes cloud-native ransomware speeding up...
Read MoreManaged Security Services Moving to the Cloud: A Cloud-First Future in 2025
The landscape of managed security services (MSS) has undergone a significant transformation in recent years. What was once a premises-based model defined by on-site hardware and localized oversight has rapidly shifted toward...
Read More