May 26, 2023
Apache HTTP Server Vulnerability CVE-2023-25690: PoC Available

Apache HTTP Server Vulnerability CVE-2023-25690: PoC Available The Apache Foundation announced on March 7, 2023, that they had addressed CVE-2023-25690 in Apache HTTP Server 2.4.56. The fix,...

Learn More
May 26, 2023
Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy

Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy In recent years, we have seen countless high-profile data breaches that have left businesses and individuals vulnerable. ...

Learn More
May 25, 2023
Guarding the Gates: An Exploration of the Top 10 Supply Chain Attacks

Guarding the Gates: An Exploration of the Top 10 Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construct...

Learn More
May 25, 2023
Luxottica Data Leak Exposes Over 70M Customers' Data

Luxottica Data Leak Exposes Over 70M Customers’ Data Luxottica, the world’s largest eyewear company, has revealed that it was the victim of a major cyber attack. The attack exposed the personal inform...

Learn More
May 24, 2023
Unleashing the Domino Effect: Google's Deletion of Unused Emails and t...

Unleashing the Domino Effect: Google’s Deletion of Unused Emails and the Cascade of Account Compromises Email accounts are the primary key to accessing various online services in today’s d...

Learn More
May 24, 2023
Cloud Threat Actor Spotlight: GUI-vil's Strategies in AWS Compromises

Cloud Threat Actor Spotlight: GUI-vil’s Strategies in AWS Compromises Researchers have been tracking a financially motivated threat group known as GUI-vil (aka p0-LUCR-1), based in Indonesia, wh...

Learn More
May 23, 2023
ChatGPT for CTI Professionals

ChatGPT for CTI Professionals In 1950, Alan Turing, the father of modern computing, asked, “Can machines think?” Over the years, that question has evolved into a quest for inventing machines that can ...

Learn More
May 22, 2023
IcedID Macro Attacks Deploy Nokoyawa Ransomware

IcedID Macro Attacks Deploy Nokoyawa Ransomware Malicious actors frequently resort to alternative techniques to gain initial access, such as employing diverse file formats and payloads. It is importan...

Learn More
May 22, 2023
Credit Card, RDP Access, Health, and Business Data Sales

Credit Card, RDP Access, Health, and Business Data Sales Welcome to this week’s edition of our dark web news summary, where we bring you the latest updates on the clandestine world of cybercrime...

Learn More
May 18, 2023
G7: Cybersecurity Reflections

G7: Cybersecurity Reflections The G7 Cybersecurity Summit 2023 is just around the corner and is being held in Hiroshima, Japan, which is a city that was devastated by an atomic bomb attack in 1945, no...

Learn More
May 18, 2023
Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Rep...

Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Report Industry cyber threat landscape means the perspective of distinct cybersecurity threats targeting the related industry. The th...

Learn More
May 18, 2023
Vulnerability in KeePass Password Manager Permits Retrieving Master Pa...

Vulnerability in KeePass Password Manager Permits Retrieving Master Password (CVE-2023-32784) [Update] June 6, 2023: KeePass has fixed the CVE-2023-32784 vulnerability in version 2.54. Attacks leverag...

Learn More
May 17, 2023
Network Devices Under Threat: Mustang Panda Targets TP-Link Routers, C...

Network Devices Under Threat: Mustang Panda Targets TP-Link Routers, Critical Teltonika Vulnerabilities  The attacks targeting European foreign affairs entities since January 2023 have been attributed...

Learn More
May 16, 2023
Major Cyberattacks in Review: April 2023

Major Cyberattacks in Review: April 2023 In April 2023, several cybersecurity incidents were reported across various industries. These included supply chain attacks, data breaches, and cryptocurrency ...

Learn More
May 16, 2023
5 Lessons Learned from Healthcare Industry Cyberattacks in 2022

5 Lessons Learned from Healthcare Industry Cyberattacks in 2022 Like other critical infrastructures, the healthcare industry is frequently targeted by cyberattacks. The attacks in the healthcare verti...

Learn More
May 15, 2023
VMware Vulnerability Exploit, Invicta Stealer, and Source Code Sales

VMware Vulnerability Exploit, Invicta Stealer, and Source Code Sales This week’s headlines feature some developments that highlight the ongoing threats posed by cybercriminals. First up, we have...

Learn More
May 15, 2023
Recent Data Breaches: Capita, Toyota, and Discord 

Recent Data Breaches: Capita, Toyota, and Discord  [Update] June 6, 2023: Capita was previously unable to confirm whether hackers had exfiltrated any data. Some USS (Universities Superannuation Scheme...

Learn More
May 12, 2023
Gulf Countries Threat Landscape Report: Cyber Security Posture of the ...

Gulf Countries Threat Landscape Report: Cyber Security Posture of the GCC Countries “Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates constitute the Cooperation Council for the...

Learn More
May 12, 2023
Essential Addons for Elementor WordPress Plugin Allows Privilege Escal...

Essential Addons for Elementor WordPress Plugin Allows Privilege Escalation (CVE-2023-32243) A popular WordPress plugin called Essential Addons for Elementor has a security vulnerability, tracked as C...

Learn More
May 11, 2023
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in ...

Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in Election Campaigns During periods of elections, people’s desire to obtain knowledge is outstanding, and they are overloaded ...

Learn More