AcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronis
Acronis
  • HomeAbout usArticlesTRU eventsThreat catalogAcronis.com
HomeAbout usArticlesTRU eventsThreat catalogAcronis.com
  • January 08, 2026
    Boto-Cor-de-Rosa campaign reveals Astaroth WhatsApp-based worm activity in Brazil
    Share
    • twitter
    • facebook
    • linkedin
    • reddit
  • December 18, 2025
    Acronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaigns
    Share
    • twitter
    • facebook
    • linkedin
    • reddit
  • December 08, 2025
    Makop ransomware: GuLoader and privilege escalation in attacks against Indian businesses
    Share
    • twitter
    • facebook
    • linkedin
    • reddit

Stay ahead with intelligence-driven cyberthreat research and reporting

January 07, 2026
MSP cybersecurity news digest, December 29, 2025
Cybersecurity
Cyberthreats
MSP cybersecurity
Active exploitation of “MongoBleed” flaw exposes data from over 87,000 servers, Patch released for high-severity RCE issue in n8n workflows, and more. Here are the latest threats to MSP security.
Author: Acronis Threat Research Unit
December 31, 2025
Acronis Cyberthreats Update, December 2025
Cybersecurity
Cyberthreats
MSP cybersecurity
The Acronis Cyberthreats Update covers current cyberthreat activity and trends, as observed by Acronis Threat Research Unit (TRU) and Acronis sensors. Figures presented here were gathered in November 2025 and reflect threats that Acronis detected, as well as news stories from the public domain.
Author: Acronis Threat Research Unit
December 26, 2025
MSP cybersecurity news digest, December 22, 2025
Cybersecurity
MSP cybersecurity
Phishing
Cyberattack on email services confirmed by France’s Interior Ministry, Maximum-severity RCE flaw disclosed in HPE OneView, and more. Here are the latest threats to MSP security.
Author: Acronis Threat Research Unit
December 08, 2025
MSP cybersecurity news digest, November 17, 2025
Cybersecurity
MSP cybersecurity
Phishing
DanaBot resurfaces, resumes Windows infections after six-month shutdown, Mass phishing campaign targets hotel bookings with 4,300 fake sites, and more. These are the latest threats to MSP security.
Author: Acronis Threat Research Unit
November 25, 2025
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix
Cybersecurity
Cyberthreats
Phishing
Acronis TRU researchers have discovered an ongoing campaign that leverages a novel combination of screen hijacking techniques with ClickFix, displaying a realistic, full-screen Windows Update of “Critical Windows Security Updates” to trick victims into executing malicious commands.
Author: Acronis Threat Research Unit
November 19, 2025
Cooking up trouble: How TamperedChef uses signed apps to deliver stealthy payloads
Cyberthreats
Acronis Threat Research Unit (TRU) observed a global malvertising / SEO campaign, tracked as “TamperedChef.” It delivers legitimate-looking installers that disguise as common applications to trick users into installing them, establish persistence and deliver obfuscated JavaScript payloads for remote access and control.
Author: Acronis Threat Research Unit
Acronis

Many companies are cyberthreat victims and don’t even know it

Acronis Cyberthreats Report H1 2025

Threat Research Unit events

The autonomous MSP: Scaling endpoint and Microsoft service delivery with AI and automation
January 20, 2026, 3:00 PM (GMT+0)
The autonomous MSP: Scaling workspace and Microsoft 365 services profitably with AI-driven efficiency
Cybersecurity
Join Acronis experts and leading MSP innovators on January 13 as we explore how platform-ization and AI are transforming endpoint and Microsoft 365 service delivery.
English
1 hour

Speakers

  • Jeff Hardy, Senior Manager, Solutions Marketing
  • Andy Kerr, Senior Manager, Solutions Marketing
  • Protecting OT Systems after Windows 10 End of Support
    February 04, 2026, 3:00 PM (GMT+0)
    Protecting OT Systems after Windows 10 End of Support
    OT event
    Cybersecurity
    Product demo
    Learn how to protect OT systems after Windows 10 end of support, assess migration options, compliance risks, and proven strategies to secure SCADA, HMI, and industrial IT without downtime.
    English
    1 hour
    Register now
  • Cybersecurity Predictions 2026: Tactics, Threats and Defensive Measures
    Webinar on demand
    Cybersecurity Predictions 2026 Webinar: Tactics, Threats and Defenses
    Cybersecurity
    Join the Acronis Threat Research Unit (TRU) for an exclusive webinar on December 10. Discover key cybersecurity predictions for 2026, learn about emerging attack tactics, and explore defense strategie ...
    English
    Watch now
  • Building OT cyber resilience to meet new compliance challenges
    Webinar on demand
    Building OT cyber resilience to meet new compliance challenges
    OT event
    Product demo
    Cybersecurity
    Discover how leading OT infrastructure operators are adapting their cyber resilience strategies to meet new compliance demands such as IEC 62443, NIS2, NERC-CIP, and GxP.
    English
    Watch now
  • Protect your Microsoft 365 Data against AI-enabled Cyberthreats
    Webinar on demand
    Protect your Microsoft 365 Data against AI-enabled Cyberthreats
    Cybersecurity
    Product demo
    Cybercriminals are using generative AI tools like ChatGPT to more effectively target Microsoft 365 with ransomware and other cyberattacks. Learn how to fight back with integrated data-protection tools ...
    English
    Watch now

Global Cyberattack Landscape

Discover how ransomware, phishing, and emerging AI-driven attacks evolve — and how Acronis helps protect your business.

Meet our speakers at upcoming events

SANS Cyber Threat Intelligence Summit & Training

In person
Virtual
Cybersecurity
www.sans.org
Jan 26, 2026 | 03:50PM EST
Whenever, Wherever… Blind Eagle Attacks: The Shadow Vector Case
Santiago Pontiroli
Santiago Pontiroli
In mid-2025, Colombian users became the target of a coordinated campaign known as Shadow Vector, which combined local social engineering with privilege escalation exploits and court-themed SVG lure documents.

CARO Workshop 2026 Innsbruck, Austria

In person
Cybersecurity
caro2026.org
February 26, 2026
No Payload For You: Inside Sidewinder’s Selective Exploitation Strategy
Eliad Kimhy
Eliad Kimhy
Eliad is a Senior Security Researcher at Acronis and has worked with security teams for nearly a decade, helping to build and lead the development of threat intelligence production and publish research-based content for both technical and general audiences.
Engage with TRU Security (RSS Feed Reader required):
  • cpoc
  • twitter
  • yt
  • linkedin
  • reddit
  • facebook
  • Legal information
  • Privacy policy
  • Acronis Cookie Notice
  • Notice of collection
© 2003–2026 Acronis International GmbH.
  • Deutsch
  • English
  • Español
  • Francais
  • Italiano
  • 日本語
  • Dutch
  • Português
  • Svenska
  • No data