We’re proud to announce that WithSecure™ has signed a Memorandum of Understanding with Ukraine’s Ministry of Economy, Environment and Agriculture to advance cyber security collaboration.
www.withsecure.com/en/whats-new...
@withsecure.bsky.social
WithSecure™ is the strategic partner for businesses that want measurable cyber security outcomes. From Europe. Trusted by the world. Formerly F-Secure Business.
We’re proud to announce that WithSecure™ has signed a Memorandum of Understanding with Ukraine’s Ministry of Economy, Environment and Agriculture to advance cyber security collaboration.
www.withsecure.com/en/whats-new...
A new chapter begins for WithSecure.
With over 90% of shares secured, we’re moving forward as a privately owned company backed by long-term partners who believe in our strategy, people, and purpose.
Read CEO Antti Koskela's letter: www.withsecure.com/en/expertise...
#CyberSecurity #WithSecure
RMM tools are being misused to bypass defenses – often without malware.
Our latest blog breaks down how this works, why most targets are in Europe, and how to stay protected.
🔗 Read more: labs.withsecure.com/publications...
#CyberSecurity #RMM #ThreatIntel
🔍 New from WithSecure™ Labs:
We reverse engineered a Lumma Stealer infection to uncover how it works and how to stop it.
🛠️ We:
- Traced the infection chain through obfuscation
- Extracted IOCs
- Shared threat hunting ideas
Read the full blog: labs.withsecure.com/publications...
#CyberSec
🚨 Our team has published fresh insights into a targeted exploitation campaign using #ToolShell against on-prem SharePoint servers. The focus is on new post-compromise activity.
📖 Read more: labs.withsecure.com/publications...
#CyberSecurity #ThreatIntel #ToolShell #Infosec
🚨 A new exploited vulnerability is published every 2 days. Zero-days? Every 3.
“Reactive defense is no longer enough.”
📖 Read more: labs.withsecure.com/publications...
#CyberSecurity #ZeroDay #InfoSec #WithSecure
🚨 Two SharePoint Server vulns (CVE-2025-53770 & CVE-2025-53771) are being exploited for RCE. On-prem only.
🔍 WithSecure detects activity via "Exploit:W32/W3WPLaunch.A!DeepGuard"
🛡️ Patch now & check for spinstall0.aspx, encoded PowerShell via w3wp.exe.
#CyberSecurity #Vulnerability #Infosec