Network Security

The Good, the Bad and the Ugly in Cybersecurity – Week 51

The Good | Authorities Dismantle Global Fraud Ring and Crypto Laundering Network Eurojust officials have dismantled a transnational fraud ring running call centers in Ukraine that scammed European victims out of more than €10 million. In collaboration with authorities from the Czech Republic, Latvia, Lithuania, and Ukraine, police arrested 12 suspects and conducted 72 searches

The Good, the Bad and the Ugly in Cybersecurity – Week 51 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 50

The Good | U.S. & Spanish Officials Crack Down on Hacktivist & Identity Theft Activities U.S. officials have charged Ukrainian national Victoria Dubranova for allegedly supporting Russian state-backed hacktivist groups in global critical infrastructure attacks. Extradited earlier this year, Dubranova faces trials in February and April 2026 tied to her suspected involvement in NoName057(16) and

The Good, the Bad and the Ugly in Cybersecurity – Week 50 Read More »

CyberVolk Returns | Flawed VolkLocker Brings New Features With Growing Pains

CyberVolk is a pro-Russia hacktivist persona we first documented in late 2024, tracking its use of multiple ransomware tools to conduct attacks aligned with Russian government interests. After seemingly lying dormant for most of 2025 due to Telegram enforcement actions, the group returned in August with a new RaaS offering called VolkLocker (aka CyberVolk 2.x).

CyberVolk Returns | Flawed VolkLocker Brings New Features With Growing Pains Read More »

Cybersecurity 2026 | The Year Ahead in AI, Adversaries, and Global Change

As we close out 2025 and look ahead to 2026, nothing is as we might have expected even a year ago. AI has disrupted, and will continue to disrupt, every corner of modern life. In threat intelligence, SentinelLABS has not only recognized this shift but actively pivoted to meet it. At the same time, geopolitical

Cybersecurity 2026 | The Year Ahead in AI, Adversaries, and Global Change Read More »

From React to Remote Code – Protecting Against the Critical React2Shell RCE Exposure

A critical remote code execution (RCE) vulnerability, dubbed ‘React2Shell’, affecting React Server Components (RSC) and Next.js, is allowing unauthenticated attackers to perform server-side code attacks via malicious HTTP requests. Discovered by Lachlan Davidson, the flaw stems from insecure deserialization in the RSC ‘Flight’ protocol and impacts packages including react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack. Exploitation is highly

From React to Remote Code – Protecting Against the Critical React2Shell RCE Exposure Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 49

The Good | Authorities Jail WiFi Hacker, Seize €1.3B Crypto Mixer & Charge Two Malicious Insiders An Australian national has received just over seven years in prison for running “evil twin” WiFi networks on various flights and airports to steal travelers’ data. Using a ‘WiFi Pineapple’ device as an access point, he cloned legitimate airport

The Good, the Bad and the Ugly in Cybersecurity – Week 49 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 48

The Good | Poland Detains Russian Hacker Amid Rising Moscow-Linked Sabotage Poland’s Central Bureau for Combating Cybercrime (CBZC) has arrested a Russian national in Kraków on suspicion of breaching the IT systems of local companies, marking the latest incident tied to what Warsaw describes as Russia’s expanding sabotage and espionage campaign across Europe. According to

The Good, the Bad and the Ugly in Cybersecurity – Week 48 Read More »

Managed Defense Reimagined: Introducing Wayfinder Threat Detection and Response

This is an era defined by relentless pressure on cybersecurity professionals. As environments and attack surfaces have expanded, endpoint, cloud, identity, and now AI signals continue to pile up faster than teams can interpret them. Meanwhile, rapidly evolving TTPs, fueled by ransomware-as-a-service (RaaS) and other off-the-shelf tooling have enabled motivated threat actors to move with

Managed Defense Reimagined: Introducing Wayfinder Threat Detection and Response Read More »