Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Unmeasurable is Unmanageable: Why Cyber Resilience Takes Center Stage for Businesses

The World Economic Forum (WEF) recently published an article on cyber resilience that resonates with conversations we have daily at Arctic Wolf. Their central argument — that organizations need to move beyond basic prevention toward comprehensive, measurable resilience — reflects what we’re hearing from business leaders across industries.

CVE-2025-42890: Hard-Coded Credentials in SAP SQL Anywhere Monitor (Non-GUI)

On November 11, 2025, SAP published a security advisory as part of their November security patches, addressing a maximum severity vulnerability identified as CVE-2025-42890 in SQL Anywhere Monitor (Non-GUI) version 17.0. The vulnerability involves hard-coded credentials, which exposes system resources to unauthorized users and allows threat actors to execute arbitrary code without authentication.

The Top 10 Ransomware TTPs

Arctic Wolf’s The State of Cybersecurity: 2025 Trends Report revealed that 23% of organizations experienced at least one significant ransomware attack in 2024. And these attacks remain difficult for organizations to remediate without succumbing to threat actor demands, with the same report finding 76% of victim organizations are electing to pay the ransom to regain access to their data and environment.

Purpose-Built for MSPs: Unlock New Market Opportunities with Arctic Wolf

In today’s evolving threat landscape, a stack of security tools isn’t enough. MSPs need a partner that helps them scale, differentiate, and deliver exceptional security outcomes. That’s why Arctic Wolf launched a purpose-built MSP program earlier this year, designed in close collaboration with our MSP partners to empower them to grow faster and more profitably.

SOCast: No Shortcuts - A Discussion on Cyber Resilience

Why do people take shortcuts in security, and how can we prevent them? Join us for a special live episode of Arctic Wolf SOCast as our experts unpack the psychology behind risky security behaviors and explore how AI is influencing decision-making in today’s workplaces. We’ll also reveal new data on how IT leaders and employees are using tools like ChatGPT and other generative AI platforms, and what that means for your organization’s security posture.

UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities

Threat Actor Name: UNC6384 Targeted Industries: Government, Diplomatic Services Geographic Focus: Hungary, Belgium, Serbia, Italy, Netherlands (broader European diplomatic community)

SOCast: No Shortcuts - A Discussion on Cyber Resilience

Why do people take shortcuts in security, and how can we prevent them? Join us for a special live episode of Arctic Wolf SOCast as our experts unpack the psychology behind risky security behaviors and explore how AI is influencing decision-making in today’s workplaces. We’ll also reveal new data on how IT leaders and employees are using tools like ChatGPT and other generative AI platforms, and what that means for your organization’s security posture.

The Howler Episode 23 - Matthew Trushinski, Vice President of Product Marketing

This month we sit down with Matthew Trushinski, Vice President of Product Marketing, as he shares how he cultivates creativity & innovation within himself and his team, skills he thinks all product marketers should have, and so much more! Matthew Trushinski has a diverse technology marketing background including carrier networks, IoT, smart cities, AI and security. As the Vice President of Product Marketing for Arctic Wolf, he works with customers and prospects to improve their security operations.

Microsoft Releases Emergency Patch for Exploited Critical Remote Code Execution Vulnerability (CVE-2025-59287)

On October 23, 2025, Microsoft released an out-of-band security update for a critical vulnerability tracked as CVE-2025-59287. The flaw stems from the deserialization of untrusted data in Windows Server Update Services (WSUS), which allows remote, unauthenticated threat actors to achieve remote code execution by sending a crafted event. According to Microsoft, only Windows servers with the WSUS Server Role enabled are affected. This feature is not enabled by default.

Brazilian Caminho Loader Employs LSB Steganography and Fileless Execution to Deliver Multiple Malware Families Across South America, Africa, and Eastern Europe

Arctic Wolf Labs has identified and analyzed a new malware loader we’re calling Caminho, a Brazilian-origin Loader-as-a-Service (LaaS) operation employing Least Significant Bit (LSB) steganography to conceal.NET payloads within image files hosted on legitimate platforms.