Events
-
RECIF 2025
-
9/17/25
Research
-
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
-
8/19/25
ModernCISO
-
Strengthen Security Before It Breaks: Making CTEM Work for You
-
8/31/25
Careers
Blogs
ModernCISO
KS Research
EN
GER
FRE
Services
Detection & Response
Threat Exposure Management
Incident Response & Digital Forensics
Advisory Services
AI & Emerging Technology Security
Operational Technology & CPS
Product Security
Managed Services
Managed Detection and Response
Leading proactive defense & effective defense, 24/7.
MDR for OT
Protect What Powers the Physical World.
Proactive Threat Hunting
Stay Ahead of Cyber Adversaries.
24/7 IR Retainer
Retained Support to Stop Breaches Before They Spiral.
Continuous Credential Leak Monitoring
Discover Leaked Logins, Prevent Costly Breaches.
By technology
MDR ONE Resolute
Go Beyond Security with a Flexible, Scalable Solution, Built on an XDR Platform.
Claroty
Protect What Powers the Physical World.
CrowdStrike
Multi-Signal MDR detection, investigation and response for the CrowdStrike Ecosystem.
Microsoft
Strengthening Resilience with Proactive Cyber Defense with MXDR For Microsoft.
Threat Alert Center
Threat Alert Center
Be the first to know about the latest vulnerabilities, attack campaigns, and highly impactful threat actor activity.
See Latest Threat Alerts
Threat Alert Center
Learn More About Our Detection & Response Services
CTEM
CTEM Strategy and Operations
Proactively Reduce Cyber Risk at Scale.
Continuous Asset and Threat Visibility
Eliminate Blind Spots in Your Security Posture.
External Attack Surface Management
Discover Unknown Assets and Eliminate External Vulnerabilities.
Risk-Based Vulnerability Management
Discover, Prioritize and Remediate the Threats That Matter Most.
Offensive Security
Penetration Testing
Identify What Automated Tools Miss with Expert-Led Manual Exploitation.
Red Team
Simulate Stealthy Threat Actors to Identify Gaps and Test Detection Capabilities.
Purple Team
Align Offense and Defense to Improve Detection and Response.
Breach Attack Simulation
Continuously Validate Your Cyber Defenses.
Learn More About Our Threat Exposure Management Services
Incident Response & Digital Forensics Services
Cyber Readiness & Preparedness
Be Ready Before Threats Strike.
Tabletop Exercises
Test Your Cyber Readiness Before the Real Attack.
Cyber Emergency Response Team
Respond Fast. Recover Smarter.
24/7 Incident Response Retainer
Retained Support to Stop Breaches Before They Spiral.
Learn More About Our IR & Digital Forensics Services
Strategy, Risk & Compliance
Maturity Assessment
Understand Your Cybersecurity Readiness.
Cyber Risk Quantification
Quantify Cyber Risk in Business Terms.
Compliance As a Service
Streamline Compliance, Strengthen Cybersecurity.
Zero Trust Assessment
Identify Gaps, Align Teams, Accelerate Zero Trust.
Third-Party Risk Management
Reduce Third-Party Risk, Strengthen Cyber Resilience.
Local Regulations Assessment
Stay Compliant Across Every Jurisdiction.
Cloud Security Posture Assessment
Strengthen Your Cloud Security Posture.
Virtual CISO
Cybersecurity Leadership Expertise, On Demand.
Learn More About Our Advisory Services
AI & Emerging Technology Services
AI Strategy & Security
Turn AI Threats Into Manageable Risk.
Blockchain Security Assessment
Make Blockchain Secure, Compliant, and Enterprise-Ready.
Quantum Computing Security
Protect Your Data from Quantum Threats.
Learn More About Our Emerging Technology Security Services
CPS/OT Security
OT Security Assessment
Close the Gap Between OT Risk and Readiness.
CPS Security Assessment
Minimize Risk in Your CPS Environment.
MDR For OT
Protect What Powers the Physical World.
Third-Party Risk Management
Reduce Third-Party Risk, Strengthen Cyber Resilience.
Learn More About Our CPS/OT Security Services
Product Security
Future-Proof Your Products Against Cyber Threats.
Learn More About Our Product Security Services
Partnerships
Industry Alliances
Technology Partnerships
Strategic Alliances
Texas DIR
See All Partnerships
Resources & Events
Resource Center
Events
ModernCISO Blog
Research Blog
Threat Alert Center
Blockchain Report Archive
Featured resource
The ModernCISO Guide to NIS2
Featured blog
Strengthen Security Before It Breaks: Making CTEM Work for You
Featured event
RECIF 2025
See All our Resources & Events
Company
Our Story
Leadership
Practice Leaders
Careers
Awards & Accolades
Certifications
Press Center
Find Us
Latest Recognitions
Listed 7 years in a row in the Market Guide for MDR Services, 2017-2024
Awarded Champion in the MDR Market Update, 2023
2x Recognized as a leading provider in the Forrester Wave™: Managed Detection And Response, 2021-2023
Discover More About Kudelski Security
Contact Us
I'm Under Attack
Services
Detection and Response
Managed Services
Managed Detection and Response
MDR ONE Resolute
MDR for OT
Proactive Threat Hunting
24/7 IR Retainer
Continuous Credential Leak Monitoring
By Technology
Microsoft
CrowdStrike
Splunk
Claroty
Threat Alert Center
Learn More About Our Detection and Response Services
Threat Exposure Management
CTEM
CTEM Strategy and Operations
Continuous Asset and Threat Visibility
External Attack Surface Management
Risk-Based Vulnerability Management
Offensive Security
Penetration Testing
Red Team
Purple Team
Breach Attack Simulation
Learn More About Our CTEM Services
IR & Digital Forensics
Cyber Readiness & Peparedness
Tabletop Exercises
Cyber Emergency Response Team
24/7 IR Retainer
Learn More About Our IR & Digital Forensics Services
Advisory Services
Strategy, Risk & Compliance
Maturity Assessment
Cyber Risk Quantification
Compliance As a Service
Zero Trust Assessment
Third-Party Risk Management
Local Regulations Assessment
Cloud Security Posture Assessment
Virtual CISO
Learn More About Our Advisory Services
AI & Emerging Technology Security
AI Strategy & Security
Blockchain Security Assessment
Quantum Computing Security
Learn More About Our AI & Emerging Technology Security Services
Operational Technology & CPS
OT Security Assessment
CPS Security Assessment
MDR for OT
Third-Party Risk Management
Learn More About Our CPS/OT Security Services
Product Security
Product Security
Learn More About Our CPS/OT Security Services
See All Our Services
Partnerships
Industry Alliances
Technology Partnerships
Strategic Alliances
Texas DIR
See All Our Partnerships
Resources & Events
Resource Center
Events
ModernCISO Blog
Research Blog
Threat Alert Center
Blockchain Report Archive
Company
Our Story
Leadership
Practice Leaders
Careers
Awards & Accolades
Certifications
Press Center
Find Us
Contact Us
I'm Under Attack
Language
French
German
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Research
The Latest News from Research at Kudelski Security
All Years
All Topics
2025
2025
2025
2025
2025
2025
2025
2025
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2021
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2023
2024
2024
2024
2024
2024
2024
2024
2024
2024
Zero-Trust
Zero-Knowledge
Vulnerability Notification
TSS
Training
Threat Research
System administration
Security Advisory
Research
Ransomware
Quantum computing
Privacy
PKI
Phising
Opinions
Network security
Network
Select Network Network
Mobile
Management
Device security
Data privacy
Data
Malware
ICS
Hacking
General
Embedded
Defense
CTF
Cryptography
Cryptocurrency
Crypto
Conferences and events
Cloud-native-security
Blockchain
Authentication
Audit
AI Security
Advisory
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AI Security
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
No items found.
August 19, 2025
2025
AI Security
Hack To The Future Slides And Content
No items found.
August 7, 2025
2025
Research
Security Advisory
Threat Research
Ransomware
A Likely Zero-Day Vulnerability in SonicWall SSL-VPN Exploited by Akira Ransomware Group
No items found.
August 6, 2025
2025
Advisory
Security Advisory
Microsoft SharePoint On-Premise Vulnerability (CVE-2025-53770) Under Active Exploitation
No items found.
July 23, 2025
2025
Advisory
Security Advisory
Adversary Infrastructure and Indicators Behind the SAP NetWeaver 0-Day Exploitation
No items found.
July 14, 2025
2025
Advisory
Persistent Exploitation of ASP.NET Components Fuels Remote Code Execution Attacks
No items found.
July 7, 2025
2025
Threat Research
Lunar Spider – Lotus V2 Loader Campaign Using Fake CAPTCHA Delivery and DLL Sideloading
No items found.
June 27, 2025
2025
Advisory
Veeam Backup & Replication: Critical RCE Patched
No items found.
June 18, 2025
2025
Advisory
Critical Exposure of Azure AD Data via Unauthenticated Microsoft GraphAPI Token
No items found.
June 3, 2025
2025
Advisory
Ivanti EPMM Bugs Combine for Unauthenticated RCE in the Wild
No items found.
May 21, 2025
2025
Advisory
Security Advisory
SonicWall SMA 100 Series – Critical Post-Authentication Vulnerabilities
No items found.
May 9, 2025
2025
Ransomware
Unmasking BlackBasta: Inside the Ransomware Syndicate’s Leaked Operations
No items found.
April 30, 2025
2025
Load More
12
/
120