AlienFox Toolkit Targets Cloud Web Hosting Frameworks to Steal Credent...
AlienFox Toolkit Targets Cloud Web Hosting Frameworks to Steal Credentials Cybercriminals are using a new toolkit called AlienFox to steal login credentials and sensitive data from cloud-based email s...
Customer Story: Social Media Takedown in the Gulf Region
Customer Story: Social Media Takedown in the Gulf Region The birth and growth of social media were one of the events shaping the last decades. It started with a straightforward idea (connecting with y...
APT Profile: APT-C-35 / DoNot Team
APT Profile: APT-C-35 / DoNot Team [Update] June 20, 2023: A new espionage campaign attributed to APT-C-35 (DoNot Team) targets users in Pakistan with trojanized apps on Google Play, added the subhead...
SmoothOperator Supply Chain Attack Targeting 3CX VOIP Desktop Client
SmoothOperator Supply Chain Attack Targeting 3CX VOIP Desktop Client [Update] June 21, 2023: Researchers found exposed Elasticsearch and Kibana instances of a third-party vendor of 3CX. Find under the...
What is Cyber Threat Intelligence? (2023 Edition)
What is Cyber Threat Intelligence? (2023 Edition) Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence...
Top 20 Cybersecurity Newsletters
Top 20 Cybersecurity Newsletters New threat actors, vulnerabilities, fraud schemes, and other attack campaigns each day make it more challenging to stay current with the cyber world; however, staying ...
How to Maintain Your Online Security? (2023 Edition)
How to Maintain Your Online Security? (2023 Edition) If you’re concerned about your online security and getting more nervous about that, that’s entirely normal. Every day we hear the news ...
Twitter Source Code Leaked on Public GitHub Repository
Twitter Source Code Leaked on Public GitHub Repository The popular social media platform Twitter is actively searching for the person responsible for a recent data leak and any other individ...
Hacktivism on the Rise: KillNet Anonymous Sudan's Cyber Campaign Targe...
Hacktivism on the Rise: KillNet Anonymous Sudan’s Cyber Campaign Targets Australia The world of cyberattacks continues to evolve with the emergence of new hacktivist groups that target different count...
Clop Serial Attacks, TP-Link Exploit & macOS Stealer
Clop Serial Attacks, TP-Link Exploit & macOS Stealer Powered by DarkMirror™ Last week, the dark web’s most spectacular news was the victims that Clop announced one after the other. The threa...
CEO Fraud: Investigating A Gift Card Scam
CEO Fraud: Investigating A Gift Card Scam On March 8, 2023, SOCRadar announced that it received a $5 million Series A investment from 212, a leading equity fund investing in B2B technology start-ups. ...
Magecart Skimmer Attack Targets WooCommerce and Authorize.net Payment ...
Magecart Skimmer Attack Targets WooCommerce and Authorize.net Payment Gateway Plugin Online transactions ease our daily lives but also pose a serious risk to both businesses and their customers. ...
CISA Issues a New Warning for Vulnerabilities in Industrial Control Sy...
CISA Issues a New Warning for Vulnerabilities in Industrial Control Systems (ICS) The recent advisories issued by the US Cybersecurity and Infrastructure Security Agency (CISA) highlight the serious v...
APT Profile: Sandworm
APT Profile: Sandworm Threat actors range from teenagers eager to earn quick cash to state-sponsored actors with agendas behind their operations. The agendas of these state-sponsored groups may includ...
Attackers Exploit Adobe Acrobat Sign to Distribute RedLine Stealer Mal...
Attackers Exploit Adobe Acrobat Sign to Distribute RedLine Stealer Malware Cybercriminals employ many ways to distribute malware, including taking advantage of legitimate services. Recently, security ...
Analysis of the Critical Infrastructure Industries From a Cybersecurit...
Analysis of the Critical Infrastructure Industries From a Cybersecurity Perspective ‘By 2024, a cyberattack will so damage critical infrastructure that a member of the G20 will reciprocate with ...
LockBit and AlphVM Announce New Victims
LockBit and AlphVM Announce New Victims Powered by DarkMirror™ Last week, two notorious ransomware groups added two more names to their victim lists. AlphVM/BlackCat announced the Amazon-owned Ring on...
Telegram 2.0: A New Era of Privacy
Telegram 2.0: A New Era of Privacy On December 6, 2022, Telegram shared a new update blog on its blog page. In this blog post, specific topics attract attention, primarily based on privacy, and will a...
APT Profile: Cozy Bear / APT29
APT Profile: Cozy Bear / APT29 [Update] February 27, 2024: See the subheading: “Joint Advisory on APT29’s Recent Initial Cloud Access Tactics” [Update] November 16, 2023: See the subheading: “APT29 Ex...
SAP Fixes Multiple Critical Vulnerabilities on March 2023 Patch Day
SAP Fixes Multiple Critical Vulnerabilities on March 2023 Patch Day SAP has recently fixed 19 vulnerabilities as part of its March 2023 patch day. Five vulnerabilities are rated critical and...