Case Studies

Case Study: Jewett-Cameron Company Targeted in Cyberattack Resulting in Data Theft

Oct 22, 2025

Jewett-Cameron Company, an Oregon-based provider of fencing and pet solutions, experienced a cyberattack that led to the theft of sensitive information and disruption of business operations. The company reported that hackers deployed encryption software and threatened to release stolen data unless a ransom is paid.

Case Study: Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

Oct 22, 2025

The latest version of Vidar Stealer, known as Vidar 2.0, employs advanced memory injection techniques to bypass browser encryption and steal login credentials. This update marks a significant evolution in its capabilities, allowing it to efficiently extract sensitive information from multiple browsers.

Case Study: Russian State Hackers Develop New Malware Tools

Oct 22, 2025

Russian state-backed hacking group Coldriver has introduced three new malware strains, NOROBOT, YESROBOT, and MAYBEROBOT, following the exposure of their previous tool, LostKeys. These new tools are designed to evade detection and target high-value data.

Case Study: The Vulnerabilities of Connection: Analyzing the Impact of the AWS Outage on Automotive Manufacturing

Oct 22, 2025

Amazon's recent AWS outage has highlighted significant vulnerabilities in the automotive manufacturing sector's reliance on cloud infrastructure. The incident, which lasted 15 hours, raised urgent questions about digital resilience and the potential economic impact on production systems that depend heavily on cloud services.

Case Study: Yahoo's Cookie Policy and User Data Management

Oct 22, 2025

Yahoo outlines its use of cookies and personal data across its family of brands, including AOL and Engadget. Users are informed about their options for managing privacy settings and consent regarding data usage.

Case Study: Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Oct 22, 2025

Cybercriminals are exploiting Microsoft 365's Direct Send feature to bypass security filters and conduct phishing campaigns. This legitimate feature, designed for enterprise convenience, has become a vector for business email compromise attacks, prompting security researchers to raise alarms.

Case Study: Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Oct 22, 2025

Cybercriminals are evolving their email phishing tactics, utilizing legacy methods combined with advanced techniques to evade security measures. New strategies include the use of QR codes, password-protected attachments, and multi-stage verification chains to compromise victims.

Case Study: GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

Oct 22, 2025

Researchers at Koi Security have identified a new cyber threat named GlassWorm that spreads through infected Visual Studio Code extensions. Utilizing invisible Unicode characters, this worm evades detection and employs the Solana blockchain for command-and-control operations.

Case Study: Hackers Exploit Azure Apps to Create Malicious Apps Impersonating Microsoft

Oct 22, 2025

A recent investigation revealed a critical loophole in Azure applications that allowed hackers to create malicious apps using reserved Microsoft names. This vulnerability enabled attackers to gain unauthorized access and escalate privileges within Microsoft 365 environments, posing significant risks to organizations.