‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole ...
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor ...
Main Analytical Frameworks for Cyber Threat Intelligence
Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found...
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240) Security researchers have recently unearthed three security vulnerabilities affe...
Dark Web Profile: Medusa Ransomware (MedusaLocker)
Dark Web Profile: Medusa Ransomware (MedusaLocker) In ancient Greek mythology, Medusa stands as one of the most iconic and feared figures. With a head full of venomous snakes in place of hair, she had...
Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter,...
Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter, US Instagram Database Leak Introducing our weekly Dark Web digest, where we explore the most recent occurrences in the online und...
Threat Actors Accessed UK Military Data From Weakest Link
Threat Actors Accessed UK Military Data From Weakest Link On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed...
MalDoc in PDF: A Novel Method to Distribute Malicious Macros
MalDoc in PDF: A Novel Method to Distribute Malicious Macros Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various ...
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023 Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly ...
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...
Don't be Blinded by What You See: Demystifying Homograph Attacks
Don’t be Blinded by What You See: Demystifying Homograph Attacks ...
QakBot, One of The Most Observed Malware
QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...
Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & ...
Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & More Welcome to this week’s Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the...
The Role of Threat Intelligence in Anti-Fraud Efforts
The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...
Chain Reactions: Footprints of Major Supply Chain Attacks
Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack ...
Guarding the Gates: An Exploration of the Top Supply Chain Attacks
Guarding the Gates: An Exploration of the Top Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construction...
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-...
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-2023-41106 In the realm of digital communication and collaboration, Zimbra Collaboration Suite has been a trusted ally for many. H...
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...
Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealin...
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Oth...
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Other E-Commerce Sites Telekopye is a Telegram bot, named by combining the words Telegram and “kopye,” which means “spear...
Navigating Cloud Vulnerabilities: Challenges and Solutions
Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...