Blog

SUBSCRIBE to
“Hide and Squeak"

Stay Ahead of Threats Worldwide.
Subscribe to Our Weekly Newsletter for the Latest Cybersecurity Insights and Threat Updates
Thank you for subscribing to our blog.
Oops! Something went wrong while submitting the form.

All articles

October 16, 2025
Pixnapping: A New Android Flaw Steals 2FA data Pixel-by-Pixel

by esentry Team

Android security vulnerability
Pixnapping attack
mobile side-channel attacks
Android zero-permission malware
CVE-2025-48561
October 16, 2025
Windows 10 End of Support in 2025: Risks, ESU Options, and What to Do Next

by esentry Team

Windows 10 end of support
Windows 10 EOL 2025
Microsoft Windows lifecycle
Windows Extended Security Updates (ESU)
Windows 11 upgrade
October 16, 2025
F5 BIG-IP Supply-Chain Breach: Source Code Stolen, Urgent Patching Required

by esentry Team

F5 BIG-IP breach
F5 source code stolen
BIG-IP zero-day vulnerabilities
Application Delivery Controller security
Web Application Firewall risk
October 10, 2025
Discord’s Data Dilemma: When a Support Portal Becomes the Hacker’s Playground

by esentry Team

Discord data breach
Zendesk hack
Third-party vendor compromise
Support portal security
Sensitive user data exposure
October 10, 2025
Oracle E-Business Suite Zero-Day Exploitation and the Rise of CL0P-Style Extortion

by esentry Team

Oracle E-Business Suite (EBS) vulnerability
CVE-2025-61882
CL0P ransomware-style extortion
ERP zero-day attacks
In-memory payloads
October 10, 2025
The Return of Scattered Lapsus$ Hunters

by esentry Team

threatintelligence
Lapsus$
Cybercrime Groups
Initial Access Brokers
October 10, 2025
Identity Protection in a Zero Trust World

by esentry Team

Zero Trust
Identity Security
Credential Abuse
Identity Protection
October 6, 2025
WhatsApp Zero-Click RCE Exploit Targets Apple Ecosystem

by esentry Team

Zero-Click Exploits
WhatsApp
Apple Security
iOS Vulnerabilities
October 6, 2025
XCSSET Evolves: Targets MACos Users And Developers

by esentry Team

XCSSET
macOS Malware
Developer Security
Supply Chain Attacks
October 6, 2025
The AKIRA Intrusion: Back and Much More Dangerous

by esentry Team

AKIRA Ransomware
Ransomware Operations
Initial Access
Lateral Movement
Sorry, we couldn’t find any results. Try another search.