Jun 07, 2024
Unleashing AI's Potential: Top 10 Tools for CISO for Productivity (Par...

Unleashing AI’s Potential: Top 10 Tools for CISO for Security (Part-2) Even in large organizations, persistent and ever-evolving cyber challenges have broken down perimeter security, and traditional m...

Learn More
Jun 07, 2024
Exploring the Most Common Passwords in Singapore: Trends, Implications...

Exploring the Most Common Passwords in Singapore: Trends, Implications, and Security Tips Passwords are essential for protecting your online accounts, yet many people still use weak, easy-to-guess pas...

Learn More
Jun 07, 2024
Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hackti...

Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hacktivist Attacks On June 28, Salwan Momika, an Iraqi immigrant to Sweden, burned a Qur’an outside a Stockholm mosque. This act, coinci...

Learn More
Jun 06, 2024
Dark Web Profile: Qilin (Agenda) Ransomware

Dark Web Profile: Qilin (Agenda) Ransomware [June 21, 2024] “Qilin Started Leaking Synnovis Data” Qilin, also known as Agenda ransomware, represents a formidable threat in cybercrime. This ransomware,...

Learn More
Jun 05, 2024
Zyxel NAS Devices’ EoL Models Patched for Critical Code Execution Vuln...

Zyxel NAS Devices’ EoL Models Patched for Critical Code Execution Vulnerabilities: CVE-2024-29972, CVE-2024-29973, CVE-2024-29974 [Update] June 24, 2024: “Critical Zyxel NAS Vulnerability (CVE-2024-29...

Learn More
Jun 04, 2024
Dark Web Profile: BlackSuit Ransomware

Dark Web Profile: BlackSuit Ransomware [Update] August 8, 2024: “BlackSuit Ransomware Extorts Over $500 Million in Ransom Demands” BlackSuit ransomware is a rebranded version of the notorious Royal ra...

Learn More
Jun 03, 2024
Alleged Data Leaks Across Major Industries; PwC, Shell, Decathlon Amon...

Alleged Data Leaks Across Major Industries; PwC, Shell, Decathlon Among Firms Facing Compromise The SOCRadar Dark Web Team has uncovered multiple high-profile data breaches involving major corporation...

Learn More
Jun 03, 2024
A Look at the Security Challenges Threatening E-Commerce Websites – Vu...

A Look at the Security Challenges Threatening E-Commerce Websites – Vulnerabilities, Skimmers, Phishing In the fast-paced world of e-commerce, cyber threats rise as much as the sector’s expandin...

Learn More
Jun 02, 2024
Overview of the Snowflake Breach: Threat Actor Offers Data of Cloud Co...

Overview of the Snowflake Breach: Threat Actor Offers Data of Cloud Company’s Customers This blog actively documents significant updates related to the Snowflake Breach. Latest update: “DOJ Indictment...

Learn More
May 31, 2024
New in CISA KEV: Check Point VPN Zero-Day CVE-2024-24919 & Linux Kerne...

New in CISA KEV: Check Point VPN Zero-Day CVE-2024-24919 & Linux Kernel Flaw CVE-2024-1086 The U.S. Cybersecurity and Infrastructure Agency (CISA) updated its Known Exploited Vulnerabilities (KEV)...

Learn More
May 31, 2024
GuptiMiner Campaign: The Trojan Tango of Infiltrating Antivirus Update...

GuptiMiner Campaign: The Trojan Tango of Infiltrating Antivirus Updates for Deception The GuptiMiner malware campaign is creating significant disruption in the cybersecurity landscape by exploiting a ...

Learn More
May 31, 2024
Top 10 Supply Chain Monitoring Platforms

Top 10 Supply Chain Monitoring Platforms In today’s globalized business environment, nearly every organization is part of a complex web of interdependencies. This interconnectedness, while enabl...

Learn More
May 30, 2024
Unleashing AI's Potential: Top 10 Tools for CISO for Security (Part-1)

Unleashing AI’s Potential: Top 10 Tools for CISO for Security (Part-1) One of the most important shifts in the dynamic, modern cyber warfare space is the changing role of the CISO. Advanced threats fo...

Learn More
May 30, 2024
Detecting Leaked Credentials with Identity & Access Intelligence

Detecting Leaked Credentials with Identity & Access Intelligence Stealers are malicious software engineered by threat actors to compromise systems. Comparable to burglars, these trojans covertly e...

Learn More
May 30, 2024
Top 5 Phishing Domain Takedown Service

Top 5 Phishing Domain Takedown Service Phishing attacks continue to pose a significant threat to both individuals and organizations. As cyber criminals continue to improve their strategies for exploit...

Learn More
May 30, 2024
Progress Telerik Report Server Receives Security Update for Critical A...

Progress Telerik Report Server Receives Security Update for Critical Auth Bypass Vulnerability, CVE-2024-4358 [Update] June 14, 2024: “CISA Adds CVE-2024-4358 to Known Exploited Vulnerabilities Catalo...

Learn More
May 29, 2024
PoC Exploit for CVE-2024-4956 in Sonatype Nexus Repository 3 Draws Thr...

PoC Exploit for CVE-2024-4956 in Sonatype Nexus Repository 3 Draws Threat Actors’ Attention Sonatype recently released a security advisory alerting users to a high-severity security vulnerabilit...

Learn More
May 29, 2024
False Positives: Million Dollars Worth Issues – Spoiler: It is not eve...

False Positives: Million Dollars Worth Issues – Spoiler: It is not even an issue. Fairy tales for adults: from the boy who cried wolf to alert fatigue. Once upon a time, a shepherd boy, bored with his...

Learn More
May 28, 2024
Top 10 Stealer Logs

Top 10 Stealer Logs Stealer logs are a critical concern as they involve the theft of sensitive information from infected systems. These digital threats, primarily aimed at acquiring data such as passw...

Learn More
May 27, 2024
New Cyber Attack Campaign Bombarding Organizations with Fake Emails an...

New Cyber Attack Campaign Bombarding Organizations with Fake Emails and Phone Calls The cyber threat landscape is always changing, with attackers using new methods to get into organizations and exploi...

Learn More