Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less

In late July 2025, Arctic Wolf Labs began observing a surge of intrusions involving suspicious SonicWall SSL VPN activity. Malicious logins were followed within minutes by port scanning, Impacket SMB activity, and rapid deployment of Akira ransomware. Victims spanned across multiple sectors and organization sizes, suggesting opportunistic mass exploitation. This campaign has recently escalated, with new infrastructure linked to it observed as late as September 20, 2025.

9 Little-Known Facts About Managed Detection and Response (MDR)

Managed Detection and Response (MDR) is a security service that has become a cornerstone of modern cybersecurity strategies. It’s designed to provide 24/7 threat monitoring, detection, and response capabilities, especially for organizations that lack the resources for an in-house security operations center (SOC). But while many have heard of MDR, there are still some common misconceptions and little-known facts about this powerful service.

REDCap: Multiple Cross-Site Scripting (XSS) Vulnerabilities

REDCap, developed by Vanderbilt University, is a secure platform designed for data collection in research studies and operations. REDCap is popular within scientific institutions and universities that require strict compliance with government regulations and data privacy laws when conducting data collection for research purposes. It is particularly useful for managing studies that often contain sensitive or private information.

Scam-Proofing Loyalty at Scale: What ATO Protection in Retail Should Look Like in 2025

Retail fraud has gone public. It no longer happens quietly in the background. Today’s scams are faster, sharper, and designed to look exactly like your brand. A spoofed checkout flow can harvest thousands of credentials before your SOC team even sees a spike. But the real damage isn’t always technical. In 2025, one impersonation scam can trigger waves of fake complaints, social media outrage, and reputational backlash that cost far more than the fraud itself.

Product update: Dynamic API Scanning, Recommendations & Classifications, and more

We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications effectively. This update covers our new Dynamic API Scanning feature, updates over the last few months, and the latest additions to our vulnerability testing capabilities.

A Single Cyberattack Stopped Jaguar Land Rover-and Could Stop You Next

The $2 Billion Cyber Disaster That Shook the Automotive World On September 2, 2025, Jaguar Land Rover (JLR) suffered a automotive cyberattack that instantly froze production lines, shutdown the dealerships and paralyzed the luxury automaker’s global IT systems during the UK’s “New Plate Day”—one of the busiest times for the industry.

Introducing Observatory and Smart Shield - see how the world sees your website, and make it faster in one click

Modern users expect instant, reliable web experiences. When your application is slow, they don’t just complain — they leave. Even delays as small as 100 ms have been shown to have a measurable impact on revenue, conversions, bounce rate, engagement and more.

Cloudflare just got faster and more secure, powered by Rust

Cloudflare is relentless about building and running the world’s fastest network. We have been tracking and reporting on our network performance since 2021: you can see the latest update here. Building the fastest network requires work in many areas. We invest a lot of time in our hardware, to have efficient and fast machines. We invest in peering arrangements, to make sure we can talk to every part of the Internet with minimal delay.

CVE-2025-20333: Authenticated RCE in Cisco ASA / FTD VPN Web Server

A high-severity vulnerability (CVSS 9.9) has been disclosed in the VPN web server component of Cisco Secure Firewall ASA and FTD software. An authenticated attacker (i.e. one possessing valid VPN credentials) can send specially crafted HTTP(S) requests that bypass input validation and lead to remote code execution as root. This means full device compromise is possible.