Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)

On 5 May, 16:00 GMT+0, our automated malware analysis pipeline detected a suspicious package released, rand-user-agent@1.0.110. It detected unusual code in the package, and it wasn’t wrong. It detected signs of a supply chain attack against this legitimate package, which has about ~45.000 weekly downloads.

What does it mean to be cyber resilient?

Achieving should be a priority for all! Everyone needs to pull their weight when it comes to protecting the lifeblood of your organization: your data. Let’s take a new approach to cybersecurity, one that assumes that cyber attacks WILL happen. Resilience means being ready for anything! Learn more about what it means to be truly by checking out the link in our bio.

Top 4 Cybersecurity Threats Facing Businesses Today

Keeping your business data safe is more important than ever. As more companies use technology and remote work grows, the risk of cybersecurity threats increases. No matter the size or small business can be a target. To stay safe, businesses need strong cybersecurity plans and must know what threats to watch out for. In this post, we'll look at the top cyber threats businesses face today and how to guard against them. Let's get started and learn how to protect your business from these risks.

Uptick in Ransomware Threat Activity Targeting Retailers in the UK

Between April and May 2025, several large UK retailers were impacted by security incidents which resulted in the disruption of their operations. Arctic Wolf is monitoring the threat landscape for new indicators of compromise related to Scattered Spider and DragonForce, and will alert Managed Detection and Response customers if any malicious activity is observed.

Ep 8: Living Off The Land

Cyber experts start getting called into electric, water, pipeline, railway, and transportation hubs around the country. Hackers have found a clever way to embed in these systems, using a small, unsuspecting device in everyday Americans’ homes. And once these hackers get in, they’re not dropping the usual malware, or sucking much of any data out. Unlike their predecessors, these hackers are very careful to cover their tracks. It appears they’re just lying in wait. Sleeper cells waiting for marching orders. So what’s the trigger? And what happens if they pull it?

The Dark Side of Online Bookings: Infostealers and Phishing in the Hospitality Industry

The high profile MGM Resorts hack by ransomware group ALPHV/BlackCat has served as a wake up call to the hospitality industry, demonstrating that the industry is a lucrative target for cybercriminals. The hack was hugely impactful to MGM making for sensational headlines in mainstream media, however what struck security experts were the social engineering methods used by the threat actors and how effective they were in bypassing security controls and technologies.

Juice Jacking: Why Using Public USB Charging Stations Can Lead to Identity Theft

We've all been there: You're away from home when you notice your phone's battery is dangerously low. For most people, the quick solution is to find a public charging station and restore their battery power. However, this may not be the safest option!

Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims

As part of our ongoing tracking of the threat actor TA4557 (also known as Venom Spider), the Arctic Wolf Labs team discovered a new campaign targeting corporate human resources departments and recruiters. The threat group uses phishing techniques to drop an enhanced version of a potent backdoor called More_eggs onto victim devices.