Case Studies

Case Study: Star Blizzard APT Adopts New Backdoor After LostKeys Malware Exposure

Oct 23, 2025

The Russian state-sponsored APT known as Star Blizzard has transitioned to using a new backdoor, MaybeRobot, following the public disclosure of its LostKeys malware. This change comes as the group continues to employ sophisticated infection techniques to target civil society members in Russia.

Case Study: Critical CVE-2025-54236 Flaw Exploited in Adobe Commerce and Magento

Oct 23, 2025

Over 250 attacks have been reported in just 24 hours targeting Adobe Commerce and Magento due to a critical flaw tracked as CVE-2025-54236. This vulnerability allows for customer account takeovers via the REST API, with only 38% of stores currently patched.

Case Study: Cybersecurity Experts Warn of Vulnerabilities in OpenAI's ChatGPT Atlas

Oct 23, 2025

Cybersecurity experts have raised concerns about OpenAI's new browser, ChatGPT Atlas, which may be susceptible to attacks that could compromise user data. The browser's features, including 'browser memories' and 'agent mode,' could potentially be exploited through prompt injection attacks, leading to unauthorized access to sensitive information.

Case Study: Smishing Triad: A Complex Phishing Campaign Targeting Sensitive Information

Oct 23, 2025

Researchers have uncovered a large-scale phishing operation known as Smishing Triad, which utilizes text messages to deceive victims. The campaign involves thousands of malicious actors and has registered approximately 195,000 domains since January 2024, primarily targeting sensitive personal information.

Case Study: Attackers Abuse Grok to Spread Phishing Links

Oct 22, 2025

Threat actors are exploiting X’s generative AI bot Grok to disseminate phishing links, according to ESET researchers. By tricking Grok into providing links in its responses, attackers are circumventing restrictions on promoted posts.

Case Study: Navigating the Future of AI Governance: Insights from California's SB 53

Oct 22, 2025

As AI becomes integral to various sectors, the need for robust governance frameworks is critical. California's SB 53 is a pioneering step towards regulating AI, but organizations must proactively implement oversight and accountability measures to manage risks effectively.

Case Study: Pwn2Own Day 2: Hackers exploit 56 zero-days for $790,000

Oct 22, 2025

During the second day of the Pwn2Own Ireland 2025 hacking competition, researchers exploited 56 unique zero-day vulnerabilities, earning $792,750 in cash. Notable exploits included a chain of five security flaws in the Samsung Galaxy S25 and multiple vulnerabilities in various NAS devices and printers.