Blog

npm Debug & Chalk Breach: Lessons from a Supply-Chain Attack

Security

npm Debug & Chalk Breach: Lessons from a Supply-Chain Attack
A supply-chain compromise of popular npm packages like `debug` and `chalk` injected stealthy crypto-stealing malware, underscoring urgent risks in open-source dependencies and the need for stronger defenses.
calendarSeptember 11, 2025
CVE-2025-42957: Critical SAP S/4HANA Vulnerability Now Exploited in the Wild

Security

CVE-2025-42957: Critical SAP S/4HANA Vulnerability Now Exploited in the Wild
A critical flaw in SAP S/4HANA (CVE-2025-42957, CVSS 9.9) is under active exploitation, allowing attackers to gain near-total control over enterprise SAP systems. This blog breaks down how the vulnerability works, the risks it poses, and the immediate steps organizations must take to protect their mission-critical operations.
calendarSeptember 8, 2025
Jaguar Land Rover Cyberattack: Managing Risk in a Connected Automotive World

Security

Jaguar Land Rover Cyberattack: Managing Risk in a Connected Automotive World
Jaguar Land Rover’s recent cyberattack highlights how digital threats now disrupt not just IT, but entire manufacturing and supply chain operations. This blog explores key lessons in resilience, supply chain security, and OT protection for today’s connected industries.
calendarSeptember 4, 2025
Palo Alto Networks Breach: Lessons from the Salesloft Drift Supply-Chain Attack

Security

Palo Alto Networks Breach: Lessons from the Salesloft Drift Supply-Chain Attack
Discover how the Palo Alto Networks breach, linked to the Salesloft Drift supply-chain attack, exposed the risks of OAuth token misuse. This blog unpacks the attack process, what went wrong, industry breach statistics, and practical steps organizations can take to strengthen SaaS and supply-chain security.
calendarSeptember 4, 2025
ShadowCaptcha Attack Turns WordPress Sites into Malware Delivery Platforms

Security

ShadowCaptcha Attack Turns WordPress Sites into Malware Delivery Platforms
ShadowCaptcha is a new campaign exploiting vulnerable WordPress sites to spread ransomware, info-stealers, and crypto miners. By luring victims with fake CAPTCHA pages, it combines technical exploits with social engineering to bypass defenses and cause severe damage.
calendarAugust 29, 2025
Beyond Botnets: The Rise of GeoServer Exploits, PolarEdge, and Gayfemboy in Cybercrime

Security

Beyond Botnets: The Rise of GeoServer Exploits, PolarEdge, and Gayfemboy in Cybercrime
Cybercrime is shifting from noisy botnets to stealthy, profit-driven campaigns exploiting internet-facing services (e.g., GeoServer, Redis) and IoT devices. Advanced threats like PolarEdge’s ORB botnets and Gayfemboy malware focus on persistence, covert operations, and monetization (cryptojacking, DDoS). Organizations must adopt proactive patching, anomaly detection, segmentation, and stronger security awareness to stay resilient.
calendarAugust 27, 2025
Akira Ransomware Breaches SonicWall VPNs — Even on Fully Updated Systems

Security

Akira Ransomware Breaches SonicWall VPNs — Even on Fully Updated Systems
Akira ransomware is exploiting a likely zero-day in SonicWall SSL VPNs, breaching even fully patched systems and moving from access to encryption within hours. The attacks highlight that patching alone isn’t enough—organizations need layered defenses, MFA, active VPN monitoring, and network segmentation. Cybersecurity must be continuous, as attackers adapt and remote access systems remain prime targets.
calendarAugust 8, 2025
Scattered Spider Arrests Bring Relief, But Copycat Hackers Sustain the Pressure

Security

Scattered Spider Arrests Bring Relief, But Copycat Hackers Sustain the Pressure
The arrests of Scattered Spider members have slowed attacks, but copycats still exploit phishing, MFA bypass, and SIM swaps to target organizations. This pause offers security teams a chance to strengthen defenses through updated incident response, tighter access controls, hypervisor monitoring, and employee training. Lasting resilience requires layered defenses that blend technology, processes, people, and continuous threat intelligence.
calendarAugust 5, 2025
Microsoft Urges Immediate Action: Critical SharePoint RCE Patch Now Available

Security

Microsoft Urges Immediate Action: Critical SharePoint RCE Patch Now Available
A critical RCE flaw in Microsoft SharePoint (CVE-2025-53770) is being actively exploited, with attackers chaining it to bypass MFA and gain persistent access. Given SharePoint’s deep integration with Microsoft 365, the risk of lateral compromise is severe. Organizations must patch immediately and adopt layered defenses including identity monitoring, EDR, and incident readiness to stay protected.
calendarJuly 25, 2025

Get in Touch!

We're here to explore what's working, what's not, and what's next. Let's align on how we can help.

Netherlands

Tachyon Security BV, Veenland 29 2291NS Wateringen, The Netherlands

USA

12620 FM 1960 Rd W, Ste A4, Houston, Texas 77065 USA