Eyl 07, 2023
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...

Learn More
Eyl 07, 2023
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole ...

Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor ...

Learn More
Eyl 06, 2023
Main Analytical Frameworks for Cyber Threat Intelligence

Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Learn More
Eyl 06, 2023
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found...

ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240) Security researchers have recently unearthed three security vulnerabilities affe...

Learn More
Eyl 05, 2023
Dark Web Profile: Medusa Ransomware (MedusaLocker)

Dark Web Profile: Medusa Ransomware (MedusaLocker) In ancient Greek mythology, Medusa stands as one of the most iconic and feared figures. With a head full of venomous snakes in place of hair, she had...

Learn More
Eyl 05, 2023
Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter,...

Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter, US Instagram Database Leak Introducing our weekly Dark Web digest, where we explore the most recent occurrences in the online und...

Learn More
Eyl 05, 2023
Threat Actors Accessed UK Military Data From Weakest Link

Threat Actors Accessed UK Military Data From Weakest Link On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed...

Learn More
Eyl 05, 2023
MalDoc in PDF: A Novel Method to Distribute Malicious Macros

MalDoc in PDF: A Novel Method to Distribute Malicious Macros Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various ...

Learn More
Eyl 04, 2023
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023 Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly ...

Learn More
Eyl 04, 2023
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...

Learn More
Eyl 01, 2023
Don't be Blinded by What You See: Demystifying Homograph Attacks

Don’t be Blinded by What You See: Demystifying Homograph Attacks ...

Learn More
Ağu 31, 2023
QakBot, One of The Most Observed Malware

QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...

Learn More
Ağu 28, 2023
Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & ...

Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & More Welcome to this week’s Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the...

Learn More
Ağu 28, 2023
The Role of Threat Intelligence in Anti-Fraud Efforts

The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...

Learn More
Ağu 28, 2023
Chain Reactions: Footprints of Major Supply Chain Attacks

Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack ...

Learn More
Ağu 28, 2023
Guarding the Gates: An Exploration of the Top Supply Chain Attacks

Guarding the Gates: An Exploration of the Top Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construction...

Learn More
Ağu 25, 2023
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-...

A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-2023-41106 In the realm of digital communication and collaboration, Zimbra Collaboration Suite has been a trusted ally for many. H...

Learn More
Ağu 25, 2023
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...

Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealin...

Learn More
Ağu 25, 2023
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Oth...

Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Other E-Commerce Sites Telekopye is a Telegram bot, named by combining the words Telegram and “kopye,” which means “spear...

Learn More
Ağu 24, 2023
Navigating Cloud Vulnerabilities: Challenges and Solutions

Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...

Learn More