First detected in September 2024 and initially targeting the United States and Canada, the Nitrogen ransomware group has since expanded its reach into parts of Africa and Europe. Many of their victims remain absent from Nitrogen’s public ransomware blog and likely...
Active Exploitation of SAP NetWeaver Systems — Our Recommendation for Local Scans
In recent days, major security companies such as ReliaQuest and Onapsis have disclosed the active exploitation of CVE-2025-31324, a critical vulnerability in SAP NetWeaver’s Visual Composer component. The vulnerability allows unauthenticated attackers to upload...
End of Life Announcement for THOR Version 10.6
Nextron Systems officially announces the End of Life (EOL) and End of Support (EOS) for THOR version 10.6, our former stable forensic scanner version. Effective December 31, 2025, THOR 10.6 will no longer receive updates, maintenance, or technical support. Background...
Obfuscated Threats – The Invisible Danger in Cybersecurity
Obfuscation is a technique widely used by cybercriminals, Advanced Persistent Threat (APT) groups, and even red-teaming operations. APTs, in particular, rely on obfuscation to remain undetected within networks for extended periods. However, modern malware, ransomware,...
Protecting Outdated and Unsupported Systems
Security strategies often assume that systems can be patched, upgraded, or replaced. In reality, many critical environments operate on legacy platforms where these options are impractical. Industrial control networks, healthcare systems, and government infrastructure...
Efficient NIS2 Compliance with THOR & ASGARD
The NIS2 Directive not only expands the scope of cybersecurity regulations but also introduces stricter penalties for non-compliance, including fines and liability risks for management. Unlike its predecessor, NIS2 mandates clear accountability and requires...
Patching is Not Enough: Why You Must Search for Hidden Intrusions
Many organizations make a critical mistake when responding to actively exploited zero-day vulnerabilities: they patch but don’t investigate. Think about it this way: If your front door was left wide open for weeks, would you just lock it and walk away? If attackers...
Why Prevention Isn’t Enough: How a Second Line of Defense Protects Your Business
According to recent reports, cyberattacks rose by 75% in the third quarter of 2024 compared to the same period in the previous year and by 15% compared to the second quarter of 2024. This alarming trend clearly shows that companies are more than ever required to...
THOR Evolution: THOR 10.7 Stable Release and the Approach of 11 TechPreview
We are excited to announce that THOR 10.7 will become the new default scanner version for ASGARD users starting Thursday, November 28th, 2024. This update introduces significant performance enhancements, including faster scan times, improved archive handling, and...
Cybersecurity is Not a Solo Endeavor – A Recap of it-sa Expo&Congress 2024
Explore key takeaways from it-sa 2024 and learn how a collaborative approach to cybersecurity is essential for building resilient defenses.
Introducing THOR Cloud: Next-Level Automated Compromise Assessments
Since the launch of THOR Cloud Lite in September, our team has been dedicated to developing a more powerful version of THOR Cloud that incorporates the full scanner with its extensive suite of forensic modules and expansive detection signature database. Today, we are...
Announcing the Launch of ASGARD Analysis Cockpit v4.1
We are excited to announce the release of ASGARD Analysis Cockpit v4.1, a substantial upgrade from version 4.0. This latest version introduces significant improvements and new features designed to enhance performance, usability, and stability. ASGARD Analysis Cockpit...