Mar 31, 2023
AlienFox Toolkit Targets Cloud Web Hosting Frameworks to Steal Credent...

AlienFox Toolkit Targets Cloud Web Hosting Frameworks to Steal Credentials Cybercriminals are using a new toolkit called AlienFox to steal login credentials and sensitive data from cloud-based email s...

Learn More
Mar 31, 2023
Customer Story: Social Media Takedown in the Gulf Region

Customer Story: Social Media Takedown in the Gulf Region The birth and growth of social media were one of the events shaping the last decades. It started with a straightforward idea (connecting with y...

Learn More
Mar 30, 2023
APT Profile: APT-C-35 / DoNot Team

APT Profile: APT-C-35 / DoNot Team [Update] June 20, 2023: A new espionage campaign attributed to APT-C-35 (DoNot Team) targets users in Pakistan with trojanized apps on Google Play, added the subhead...

Learn More
Mar 30, 2023
SmoothOperator Supply Chain Attack Targeting 3CX VOIP Desktop Client

SmoothOperator Supply Chain Attack Targeting 3CX VOIP Desktop Client [Update] June 21, 2023: Researchers found exposed Elasticsearch and Kibana instances of a third-party vendor of 3CX. Find under the...

Learn More
Mar 30, 2023
What is Cyber Threat Intelligence? (2023 Edition)

What is Cyber Threat Intelligence? (2023 Edition) Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence...

Learn More
Mar 29, 2023
Top 20 Cybersecurity Newsletters

Top 20 Cybersecurity Newsletters New threat actors, vulnerabilities, fraud schemes, and other attack campaigns each day make it more challenging to stay current with the cyber world; however, staying ...

Learn More
Mar 29, 2023
How to Maintain Your Online Security? (2023 Edition)

How to Maintain Your Online Security? (2023 Edition) If you’re concerned about your online security and getting more nervous about that, that’s entirely normal. Every day we hear the news ...

Learn More
Mar 29, 2023
Twitter Source Code Leaked on Public GitHub Repository

Twitter Source Code Leaked on Public GitHub Repository The popular social media platform Twitter is actively searching for the person responsible for a recent data leak and any other individ...

Learn More
Mar 28, 2023
Hacktivism on the Rise: KillNet Anonymous Sudan's Cyber Campaign Targe...

Hacktivism on the Rise: KillNet Anonymous Sudan’s Cyber Campaign Targets Australia The world of cyberattacks continues to evolve with the emergence of new hacktivist groups that target different count...

Learn More
Mar 28, 2023
Clop Serial Attacks, TP-Link Exploit & macOS Stealer

Clop Serial Attacks, TP-Link Exploit & macOS Stealer Powered by DarkMirror™ Last week, the dark web’s most spectacular news was the victims that Clop announced one after the other. The threa...

Learn More
Mar 27, 2023
CEO Fraud: Investigating A Gift Card Scam

CEO Fraud: Investigating A Gift Card Scam On March 8, 2023, SOCRadar announced that it received a $5 million Series A investment from 212, a leading equity fund investing in B2B technology start-ups. ...

Learn More
Mar 24, 2023
Magecart Skimmer Attack Targets WooCommerce and Authorize.net Payment ...

Magecart Skimmer Attack Targets WooCommerce and Authorize.net Payment Gateway Plugin Online transactions ease our daily lives but also pose a serious risk to both businesses and their customers. ...

Learn More
Mar 23, 2023
CISA Issues a New Warning for Vulnerabilities in Industrial Control Sy...

CISA Issues a New Warning for Vulnerabilities in Industrial Control Systems (ICS) The recent advisories issued by the US Cybersecurity and Infrastructure Security Agency (CISA) highlight the serious v...

Learn More
Mar 22, 2023
APT Profile: Sandworm

APT Profile: Sandworm Threat actors range from teenagers eager to earn quick cash to state-sponsored actors with agendas behind their operations. The agendas of these state-sponsored groups may includ...

Learn More
Mar 21, 2023
Attackers Exploit Adobe Acrobat Sign to Distribute RedLine Stealer Mal...

Attackers Exploit Adobe Acrobat Sign to Distribute RedLine Stealer Malware Cybercriminals employ many ways to distribute malware, including taking advantage of legitimate services. Recently, security ...

Learn More
Mar 21, 2023
Analysis of the Critical Infrastructure Industries From a Cybersecurit...

Analysis of the Critical Infrastructure Industries From a Cybersecurity Perspective ‘By 2024, a cyberattack will so damage critical infrastructure that a member of the G20 will reciprocate with ...

Learn More
Mar 20, 2023
LockBit and AlphVM Announce New Victims

LockBit and AlphVM Announce New Victims Powered by DarkMirror™ Last week, two notorious ransomware groups added two more names to their victim lists. AlphVM/BlackCat announced the Amazon-owned Ring on...

Learn More
Mar 20, 2023
Telegram 2.0: A New Era of Privacy

Telegram 2.0: A New Era of Privacy On December 6, 2022, Telegram shared a new update blog on its blog page. In this blog post, specific topics attract attention, primarily based on privacy, and will a...

Learn More
Mar 17, 2023
APT Profile: Cozy Bear / APT29

APT Profile: Cozy Bear / APT29 [Update] February 27, 2024: See the subheading: “Joint Advisory on APT29’s Recent Initial Cloud Access Tactics” [Update] November 16, 2023: See the subheading: “APT29 Ex...

Learn More
Mar 16, 2023
SAP Fixes Multiple Critical Vulnerabilities on March 2023 Patch Day

SAP Fixes Multiple Critical Vulnerabilities on March 2023 Patch Day SAP has recently fixed 19 vulnerabilities as part of its March 2023 patch day. Five vulnerabilities are rated critical and...

Learn More