Case Studies

Case Study: North Korean Threat Actors Target European Drone Makers

Oct 24, 2025

Researchers have identified a new wave of cybersecurity attacks against European drone makers by the Lazarus Group, a North Korean government-affiliated threat actor. This campaign, part of 'Operation DreamJob,' uses social engineering tactics to exfiltrate proprietary information.

Case Study: Comcast Data Exposed by Medusa Ransomware Gang After Ransom Refusal

Oct 24, 2025

Comcast Corporation has had 186.36 GB of compressed data, totaling 834 GB of stolen information, exposed by the Medusa ransomware gang after refusing to pay a $1.2 million ransom. The data includes sensitive Excel files and scripts related to auto premium analysis.

Case Study: Teenagers Charged in TfL Cyber Attack Case

Oct 24, 2025

Two teenagers have been charged with computer hacking offenses related to a cyber attack on Transport for London (TfL) that caused significant disruption last year. The attack, attributed to the cyber-criminal group Scattered Spider, resulted in £39 million in damages.

Case Study: Toys “R” Us Canada Warns Customers of Data Breach

Oct 23, 2025

Toys “R” Us Canada has confirmed a data breach where customer records were leaked by threat actors. The company is notifying affected customers and has upgraded its security measures following the incident.

Case Study: Salt Typhoon Exploits Zero-Day Vulnerabilities and DLL Sideloading Techniques

Oct 23, 2025

Salt Typhoon, a China-linked APT group, is leveraging zero-day exploits and DLL sideloading techniques to conduct sophisticated cyber espionage campaigns against critical infrastructure worldwide. Recent activities include targeting telecommunications and energy sectors, demonstrating advanced capabilities to compromise lawful intercept systems.

Case Study: Surge in Clickfix Attacks and AI-Powered BEC Scams Highlight New Cyber Threats

Oct 23, 2025

Cybercriminals are increasingly leveraging Clickfix social engineering tactics and AI in Business Email Compromise (BEC) scams, leading to a 500% surge in Clickfix attacks in early 2025. Mimecast's latest report reveals a shift in tactics that focus on the human element, making phishing and scams harder to detect.

Case Study: Forescout Warns of Critical Vulnerabilities in TP-Link Routers

Oct 23, 2025

Forescout Technologies has identified two critical vulnerabilities in TP-Link Omada and Festa VPN routers that could expose industrial systems to significant risks. The vulnerabilities, CVE-2025-7850 and CVE-2025-7851, allow for OS command injection and unauthorized root access, respectively.

Case Study: Mimecast Report: AI Phishing and ClickFix Attacks Explode

Oct 23, 2025

Mimecast's latest report reveals a staggering 500% increase in AI-driven phishing and ClickFix schemes as cybercriminals exploit trusted services to bypass email security. The report highlights that phishing now accounts for 77% of all attacks, marking a significant evolution in attacker behavior.

Case Study: Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Oct 23, 2025

Caminho, a Brazilian Loader-as-a-Service (LaaS), uses Least Significant Bit (LSB) steganography to hide .NET payloads in images, allowing malware to bypass defenses. This threat targets businesses across South America, Africa, and Eastern Europe, utilizing spear-phishing tactics to deliver its payloads.

Case Study: High-Severity Path Traversal Vulnerability in Jira Software

Oct 23, 2025

Atlassian has disclosed a critical path traversal vulnerability in Jira Software Data Center and Server, allowing authenticated attackers to write files to any path accessible by the JVM. The flaw, tracked as CVE-2025-22167, affects versions from 9.12.0 through 11.0.1 and poses significant risks if unpatched.