top of page
Search


Semperis Names Women in Cyber Security (WiCyS) as Action Partner for Midnight in the War Room
Semperis , the identity-driven cyber resilience and crisis management company, today named Women in CyberSecurity (WiCyS) — the premier global advocacy organization dedicated to the recruitment, retention, and advancement of women in cybersecurity—as an Action Partner for Midnight in the War Room , the groundbreaking documentary on cyberwar. Read more.
Feb 10


Australians urged to tighten online habits on & off duty
Semperis has urged Australians to tighten everyday online habits at work and at home, warning that cybercriminals increasingly use phishing and other social engineering tactics that target people rather than systems. Gerry Sillars, Vice President, APJ at Semperis, said attackers continue to manipulate users into opening malicious emails and taking unsafe actions. He described Safer Internet Day as a prompt for individuals and organisations to revisit how they spot and respond
Feb 9


Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026. "The threat actor stopped maintaining its C2 servers on January 8 for the first time since we began monitoring their activities," Tomer Bar, vice president of security resea
Feb 4


Organizations Warned of Exploited Linux Vulnerabilities
An attacker can exploit the bug by sending crafted Telnet commands to set the USER variable, bypass authentication, and obtain a root shell, gaining remote code execution (RCE) on vulnerable systems, SafeBreach explains . Read more.
Jan 26


Increased sophistication showcased by reemergent Prince of Persia APT
HackRead reports Iranian advanced persistent threat operation Prince of Persia, also known as Infy, has reemerged with expanded targeting and a more sophisticated attack arsenal almost three years after it went on hiatus. Despite continuing to harness the Foudre and Tonnerre malware pair, Prince of Persia has gone to update the former, which has been launched upon Foudre's discovery of high-value targets, according to a SafeBreach analysis. Read more.
Dec 18, 2025


Iranian Nation-State APT Targeting Networks and Critical Infrastructure Organizations
SafeBreach analysts identified this renewed activity after a three-year dormant period, noting the group’s transition to more resilient operational security practices. Their research highlighted the group’s use of distinct malware families, Foudre and Tonnerre, which now feature advanced capabilities for persistence and data theft. The investigation also linked the operation to a specific persona, “Ehsan,” suggesting a centralized and human-operated management of the campaig
Dec 18, 2025


Cyberattacks by Iranian Nation-State APTs Targeting Vital Infrastructure
Researchers at SafeBreach Labs have uncovered fresh activity from the Iranian state-sponsored hacking group known as “Prince of Persia” (also referred to as “Infy”), revealing that the threat actor has been silently operating sophisticated malware campaigns since resurfacing in 2025 after a three-year hiatus. Read more.
Dec 18, 2025


Ransomware attacks targeted at weekends and holidays
Most ransomware attacks occur during weekends and holidays, times of distraction or disruption when the majority of SOCs are not adequately staffed. A new report from Semperis finds that 52 percent of surveyed organizations in the US, UK, France, Germany, Italy, Spain, Singapore, Canada, Australia and New Zealand were targeted at holidays or weekends. Alarmingly, 78 percent of companies cut security operation centre (SOC) staffing by 50 percent or more during holidays and w
Nov 23, 2025


New Attack Combines Ghost SPNs and Kerberos Reflection to Elevate Privileges on SMB Servers
A sophisticated privilege escalation vulnerability in Windows SMB servers, leveraging Ghost Service Principal Names (SPNs) and Kerberos authentication reflection to achieve remote SYSTEM-level access. Microsoft designated this as CVE-2025-58726 , an “SMB Server Elevation of Privilege” flaw impacting all Windows versions absent enforced SMB signing. According to Semperis, the issue persists in environments with default Active Directory (AD) configurations, underscoring Kerber
Oct 29, 2025


Quick Share’s Security Leap: Android’s File-Sharing Shield
In the ever-evolving landscape of mobile technology, Google’s Quick Share is poised for a significant security upgrade. According to recent reports, the file-sharing feature could soon integrate with Android’s Advanced Protection Program, potentially revolutionizing how users safeguard their data during transfers. This development comes amid growing concerns over unauthorized access and file theft in an increasingly connected world. The rumor, first highlighted by Android Aut
Oct 27, 2025


Qlosi demonstrates consistent pupil size reduction in presbyopia
Pupil size reduction remained consistent through day 8. More eyes improved from day 1 to day 8. These results suggest neuroadaptation with Qlosi. Qlosi demonstrated consistent pupil size reduction and increasing rates of near visual acuity in patients with presbyopia over 8 days, according to a study. Read more.
Oct 24, 2025


Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported
SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 2025 update. The flaw, CVE-2025-49760 , allowed an attacker to conduct spoofing attacks and impersonate a legitimate server using the Windows storage mechanism. Ron Ben Yizak discussed the discovery at the DEF CON 33 conference. Read more.
Sep 20, 2025


New Win-DoS Flaws Could Weaponize Windows Domain Controllers for DDoS Attacks
A newly discovered attack method could allow hackers to crash public Windows domain controllers (DCs) worldwide and weaponize them for...
Aug 10, 2025


Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home
For likely the first time ever, security researchers from Safebreach have shown how AI can be hacked to create real-world havoc, allowing...
Aug 5, 2025


Safebreach research shows Google Calendar invites let researchers hijack Gemini to leak user data
By sending a calendar invite with an embedded prompt injection, often hidden in the event title, attackers can potentially exfiltrate...
Aug 3, 2025


Ransomware Attacks Escalate to Physical Threats Against Executives
Ransomware actors are resorting to extreme measures to pressure victims into paying demands, including threats of physical harm to...
Jul 30, 2025


nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
New research has uncovered continued risk from a known security weakness in Microsoft's Entra ID , potentially enabling malicious actors...
Jun 24, 2025


Semperis adds detection for dMSA attacks in Windows Server
S emperis has announced new detection capabilities in its Directory Services Protector platform in collaboration with Akamai to address...
Jun 9, 2025


Enterprises struggle with serious gaps in cyber response plans
A new survey of 1,000 businesses across the UK, UK, Europe and the Asia-Pacific region reveals a worrying disconnect between...
May 13, 2025


Water and Electricity Companies Suffer Severe Damage from Cyber-Attacks
80 percent of operators were targeted multiple times. More than half of cyber-attacks experienced by critical services disrupted...
Apr 4, 2025
bottom of page
