Apr 17, 2023
Microsoft Products as an Attack Vector

Microsoft Products as an Attack Vector Microsoft is one of the big five American information technology companies and one of the leading companies in the information technology sector. With a wide ran...

Learn More
Apr 17, 2023
Lockbit 3.0: Another Upgrade to World’s Most Active Ransomware

Lockbit 3.0: Another Upgrade to World’s Most Active Ransomware Last Update: April 17, 2023 LockBit Ransomware gang, also known as Bitwise Spider, are the cybercriminal masterminds behind the popular L...

Learn More
Apr 14, 2023
Change of Tactic in DDoS: Attackers Now Use VPS for Improved Botnet At...

Change of Tactic in DDoS: Attackers Now Use VPS for Improved Botnet Attacks Cloudflare, a prominent internet security company, recently published a report on hyper-volumetric DDoS attacks ch...

Learn More
Apr 13, 2023
Recapping Cyberwatch: Insights and Key Takeaways from April's Webinar

Recapping Cyberwatch: Insights and Key Takeaways from April’s Webinar In today’s digital world, cyberattacks are becoming increasingly frequent and sophisticated, posing a significant thre...

Learn More
Apr 13, 2023
Recent Data Breaches: Hyundai, NorthOne Bank, and Kodi

Recent Data Breaches: Hyundai, NorthOne Bank, and Kodi Data breaches have become widespread in the digital age, leaving companies and individuals at risk of cyber attacks. Three high-profile companies...

Learn More
Apr 13, 2023
Insider Threats: The Hidden Enemy of Cybersecurity

Insider Threats: The Hidden Enemy of Cybersecurity The human factor is one of the most challenging components of cybersecurity, and the topic where the human factor is most evident is insider threats....

Learn More
Apr 12, 2023
Microsoft and SAP Release Security Updates to Address Critical Vulnera...

Microsoft and SAP Release Security Updates to Address Critical Vulnerabilities Microsoft has released new security updates on the Patch Tuesday April 2023, to address 97 vulnerabilities. One...

Learn More
Apr 11, 2023
CISA Warns: Patch Apple Zero-Day Vulnerabilities Until May

CISA Warns: Patch Apple Zero-Day Vulnerabilities Until May Apple released patches on April 7 to address two zero-day vulnerabilities, CVE-2023-28205 and CVE-2023-28206. The vendor acknowledges a ...

Learn More
Apr 11, 2023
What's Next for Cybercrime Ecosystem After Genesis Market Takedown?

What’s Next for Cybercrime Ecosystem After Genesis Market Takedown? One can desire the forbidden, as is the narrative in the Genesis chapter of the Old Testament. In today’s digital world,...

Learn More
Apr 10, 2023
Major Cyberattacks in Review: March 2023

Major Cyberattacks in Review: March 2023 Cybersecurity remains a major concern for organizations of all sizes as cyberattacks become more sophisticated and frequent. Despite efforts to enhan...

Learn More
Apr 10, 2023
Critical Vulnerability in vm2 JavaScript Sandbox Library: Exploit Code...

Critical Vulnerability in vm2 JavaScript Sandbox Library: Exploit Code Available [April 19, 2023] Update: Added subheading: “Patches Released for New Vulnerabilities: CVE-2023-29199 and CVE-2023-30547...

Learn More
Apr 10, 2023
MSI Breach, Operation Cookie Monster & Data Sales

MSI Breach, Operation Cookie Monster & Data Sales Powered by DarkMirror™ Ransomware attacks continue to be a nightmare for organizations. The Money Message group made a name for itself for a while...

Learn More
Apr 07, 2023
Cisco Releases Patches for Vulnerabilities in Multiple Products

Cisco Releases Patches for Vulnerabilities in Multiple Products Cisco, this week released updates to fix various security vulnerabilities in its products. These updates also cover serious issues affec...

Learn More
Apr 06, 2023
What is a Phishing Kit?

What is a Phishing Kit? A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with li...

Learn More
Apr 05, 2023
New Rorschach Ransomware: The Fastest Encryptor

New Rorschach Ransomware: The Fastest Encryptor Researchers have discovered a new ransomware strain called Rorschach. This sophisticated and fast form of malware was used to target a co...

Learn More
Apr 04, 2023
How SOCRadar Can Help Fraud Teams?

How SOCRadar Can Help Fraud Teams? Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made...

Learn More
Apr 04, 2023
Hackers Exploit WinRAR SFX Archives to Install Backdoors Undetected

Hackers Exploit WinRAR SFX Archives to Install Backdoors Undetected Threat actors exploit WinRAR self-extracting (SFX) archives containing decoy files by adding malicious functionality to in...

Learn More
Apr 03, 2023
Attackers Actively Exploit Vulnerabilities in Unpatched Products: Zimb...

Attackers Actively Exploit Vulnerabilities in Unpatched Products: Zimbra, IBM Aspera Faspex, Cacti, Realtek Threat actors are actively exploiting security vulnerabilities in Zimbra, IBM Aspera Fa...

Learn More
Apr 03, 2023
How SOCRadar Can Help You with Threat Hunting?

How SOCRadar Can Help You with Threat Hunting? This article briefly explains threat hunting and SOCRadar’s ability to use the feature. If you are still reading this, we invite you to try SOCRadar XTI ...

Learn More
Apr 03, 2023
Notorious Ransomware Gangs on Attack Spree

Notorious Ransomware Gangs on Attack Spree Powered by DarkMirror™ In the dark web summary of the previous week, we talked about the victims that the Clop ransomware group has repeatedly revealed. Prob...

Learn More