AcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronis
Acronis
  • HomeAbout usArticlesTRU eventsThreat catalogAcronis.com
HomeAbout usArticlesTRU eventsThreat catalogAcronis.com
  • December 18, 2025
    Acronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaigns
    Share
    • twitter
    • facebook
    • linkedin
    • reddit
  • December 08, 2025
    Makop ransomware: GuLoader and privilege escalation in attacks against Indian businesses
    Share
    • twitter
    • facebook
    • linkedin
    • reddit
  • November 25, 2025
    Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix
    Share
    • twitter
    • facebook
    • linkedin
    • reddit

Stay ahead with intelligence-driven cyberthreat research and reporting

November 19, 2025
Cooking up trouble: How TamperedChef uses signed apps to deliver stealthy payloads
Cyberthreats
Acronis Threat Research Unit (TRU) observed a global malvertising / SEO campaign, tracked as “TamperedChef.” It delivers legitimate-looking installers that disguise as common applications to trick users into installing them, establish persistence and deliver obfuscated JavaScript payloads for remote access and control.
Author: Acronis Threat Research Unit
November 18, 2025
Acronis Cyberthreats Update, November 2025
Cybersecurity
Cyberthreats
MSP cybersecurity
The Acronis Cyberthreats Update covers current cyberthreat activity and trends, as observed by Acronis Threat Research Unit (TRU) and Acronis sensors. Figures presented here were gathered in October 2025 and reflect threats that Acronis detected, as well as news stories from the public domain.
Author: Acronis Threat Research Unit
November 10, 2025
Acronis TRU Alliance {VirusTotal}: Tracking FileFix, Shadow Vector, and SideWinder
Cybersecurity
Cyberthreats
MSP cybersecurity
Phishing
Introducing the Acronis TRU Alliance Series. This new series highlights collaborative research analysis between Acronis Threat Research Unit (TRU) and other leading threat intelligence teams. In this first post of our collaboration series, we’ve teamed up with VirusTotal (VT) to share practical insights from Acronis TRU on several recent reports.
Author: Acronis Threat Research Unit
November 04, 2025
The DragonForce Cartel: Scattered Spider at the gate
Cybersecurity
Acronis Threat Research Unit (TRU) analyzed DragonForce, a Conti-derived ransomware-as-a-service active since 2023, documenting its malware, affiliate model and links to Scattered Spider.
Author: Acronis Threat Research Unit
September 25, 2025
ARINC’s common-use passenger processing system MUSE Disruption Impacts Flights Across Europe
Cybersecurity
Cyberthreats
Major European airports including Heathrow, Brussels, Berlin, and Dublin have reported disruptions in check-in, boarding, and kiosk systems. The outages have been linked to Collins Aerospace’s passenger processing platform MUSE, a system used across many international airports.
Author: Acronis
September 11, 2025
Acronis Cyberthreats Update, September 2025
Cybersecurity
Cyberthreats
MSP cybersecurity
The Acronis Cyberthreats Update covers current cyberthreat activity and trends, as observed by Acronis Threat Research Unit (TRU) and Acronis sensors. Figures presented here were gathered in August 2025 and reflect threats that Acronis detected, as well as news stories from the public domain.
Author: Acronis Threat Research Unit
Acronis

Many companies are cyberthreat victims and don’t even know it

Acronis Cyberthreats Report H1 2025

Threat Research Unit events

The autonomous MSP: Scaling endpoint and Microsoft service delivery with automation and AI
January 20, 2026, 3:00 PM (GMT+0)
The autonomous MSP: Scaling workspace and Microsoft 365 services profitably with AI-driven efficiency
Cybersecurity
Join Acronis experts and leading MSP innovators on January 13 as we explore how platform-ization and AI are transforming endpoint and Microsoft 365 service delivery.
English
1 hour

Speakers

  • Jeff Hardy, Senior Manager, Solutions Marketing
  • Andy Kerr, Senior Manager, Solutions Marketing
  • Cybersecurity Predictions 2026: Tactics, Threats and Defensive Measures
    Webinar on demand
    Cybersecurity Predictions 2026 Webinar: Tactics, Threats and Defenses
    Cybersecurity
    Join the Acronis Threat Research Unit (TRU) for an exclusive webinar on December 10. Discover key cybersecurity predictions for 2026, learn about emerging attack tactics, and explore defense strategie ...
    English
    Watch now
  • Building OT cyber resilience to meet new compliance challenges
    Webinar on demand
    Building OT cyber resilience to meet new compliance challenges
    OT event
    Product demo
    Cybersecurity
    Discover how leading OT infrastructure operators are adapting their cyber resilience strategies to meet new compliance demands such as IEC 62443, NIS2, NERC-CIP, and GxP.
    English
    Watch now
  • Protect your Microsoft 365 Data against AI-enabled Cyberthreats
    Webinar on demand
    Protect your Microsoft 365 Data against AI-enabled Cyberthreats
    Cybersecurity
    Product demo
    Cybercriminals are using generative AI tools like ChatGPT to more effectively target Microsoft 365 with ransomware and other cyberattacks. Learn how to fight back with integrated data-protection tools ...
    English
    Watch now
  • Virtual conference: Build the Business Case for Upgrading your OT/ICS Cyber Resilience
    Webinar on demand
    Virtual conference: Build the Business Case for Upgrading your Operational Technology (OT) Cyber Resilience
    OT event
    Cybersecurity
    Product demo
    In today’s fast-changing threat landscape, operational technology (OT) resilience is no longer optional. It’s essential. But how can you strength...
    English
    Watch now

Global Cyberattack Landscape

Discover how ransomware, phishing, and emerging AI-driven attacks evolve — and how Acronis helps protect your business.

Meet our speakers at upcoming events

CARO Workshop 2026 Innsbruck, Austria

In person
Cybersecurity
caro2026.org
February 26, 2026
No Payload For You: Inside Sidewinder’s Selective Exploitation Strategy
Eliad Kimhy
Eliad Kimhy
Eliad is a Senior Security Researcher at Acronis and has worked with security teams for nearly a decade, helping to build and lead the development of threat intelligence production and publish research-based content for both technical and general audiences.
Engage with TRU Security (RSS Feed Reader required):
  • cpoc
  • twitter
  • yt
  • linkedin
  • reddit
  • facebook
  • Legal information
  • Privacy policy
  • Acronis Cookie Notice
  • Notice of collection
© 2003–2025 Acronis International GmbH.
  • Deutsch
  • English
  • Español
  • Francais
  • Italiano
  • 日本語
  • Dutch
  • Português
  • Svenska
  • No data