

Gunra Ransomware Group Unveils Efficient Linux Variant
This blog discusses how Gunra ransomware’s new Linux variant accelerates and customises encryption, expanding the group’s reach with advanced cross-platform tactics.
Since its initial release in late 2022, the AI-powered text generation tool known as ChatGPT has been experiencing rapid adoption rates from both organisations and individual users. However, its latest feature, known as Shared Links, comes with the potential risk of unintentional disclosure of confidential information.
This blog discusses how Gunra ransomware’s new Linux variant accelerates and customises encryption, expanding the group’s reach with advanced cross-platform tactics.
Security is a central challenge in modern application development and maintenance, requiring not just traditional practises but also a deep understanding of application architecture and data flow. While organisations now have access to rich data like logs and telemetry, the real challenge lies in translating this information into actionable insights. This article explores how leveraging those insights can help detect genuine security incidents and prevent their recurrence.
We examine the past tactics used by UNC3886 to gain insight on how to best strengthen defences against the ongoing and emerging threats of this APT group.
Lead with AI-powered email security to stay ahead of attackers and personalise user interaction at every touchpoint, bridging technology and behaviour with precision.
Lumma Stealer has re-emerged shortly after its takedown. This time, the cybergroup behind this malware appears to be intent on employing more covert tactics while steadily expanding its reach. This article shares the latest methods used to propagate this threat.
CVE-2025-53770 and CVE-2025-53771 are vulnerabilities in on-premise Microsoft SharePoint Servers that evolved from previously patched flaws, allowing unauthenticated remote code execution through advanced deserialization and ViewState abuse.
Proactive security in a rapidly evolving threat landscape
This blog explores key findings from CISA’s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision One™ Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibility—offering insights into how integrated security solutions can help organisations strengthen their cloud identity defences and meet evolving federal standards.
A zero-click exploit called EchoLeak reveals how AI assistants like Microsoft 365 Copilot can be manipulated to leak sensitive data without user interaction. This entry breaks down how the attack works, why it matters, and what defences are available to proactively mitigate this emerging AI-native threat.
BERT is a newly emerged ransomware group that pairs simple code with effective execution—carrying out attacks across Europe and Asia. In this entry, we examine the group’s tactics, how their variants have evolved, and the tools they use to get past defences and speed up encryption across platforms.