Oct 03, 2022
The Week in Dark Web – 3 October 2022 – Data Leaks and Access Sales...

The Week in Dark Web – 3 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors sold which companies’ or governments’ data on the dark web in the first week of Oct...

Learn More
Oct 03, 2022
Ransomware Gangs Targeting US Critical Infrastructure

Ransomware Gangs Targeting US Critical Infrastructure Last week, notorious ransomware gangs made a splash again by targeting US critical infrastructures. One of the threat actors that victimized the d...

Learn More
Oct 03, 2022
SolarMarker Distributes Malware Via Fake Chrome Updates

SolarMarker Distributes Malware Via Fake Chrome Updates Threat actors related to SolarMarker strike with watering hole attacks as a new method of delivering malware rather than the previously used SEO...

Learn More
Sep 30, 2022
Threat Actors Exploit Unpatched Microsoft Exchange Zero-Days (ProxyNot...

Threat Actors Exploit Unpatched Microsoft Exchange Zero-Days (ProxyNotShell) Security experts caution about actively exploited zero-day vulnerabilities in Microsoft Exchange servers. The flaws could a...

Learn More
Sep 29, 2022
Dark Web Profile: Overthinker1877

Dark Web Profile: Overthinker1877 Overthinker1877 or 1877 Team have recently drawn attention for their random attacks worldwide. Although the first remarkable attack was ransomware against a Romanian ...

Learn More
Sep 29, 2022
Brute Ratel C4 Toolkit Gets Cracked and Distributed Online

Brute Ratel C4 Toolkit Gets Cracked and Distributed Online The cracked version of Brute Ratel C4 (BRC4) is currently being distributed on hacker platforms for free. Posts spreading it have been seen i...

Learn More
Sep 28, 2022
Critical WhatsApp Vulnerabilities Allow Attackers Remote Device Hackin...

Critical WhatsApp Vulnerabilities Allow Attackers Remote Device Hacking WhatsApp’s September security update fixes two high-severity flaws that could result in remote code execution. T...

Learn More
Sep 28, 2022
Threat Actors Impersonate GitHub, Zoom, and Cloudflare to Steal User I...

Threat Actors Impersonate GitHub, Zoom, and Cloudflare to Steal User Information Hackers frequently look for ways to trick users and organizations, as the weakest link in security is the human factor....

Learn More
Sep 28, 2022
Dark Web Profile: Moses Staff

Dark Web Profile: Moses Staff Over the past months, the SOCRadar Analyst Team has been tracking the Iranian hacker group known as Moses Staff. The group was first spotted in October 2021 and claimed i...

Learn More
Sep 27, 2022
Top Cyber Threats Faced by the Aviation Industry

Top Cyber Threats Faced by the Aviation Industry The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important...

Learn More
Sep 27, 2022
Exmatter Tool Provides a New Strategy for Extortion

Exmatter Tool Provides a New Strategy for Extortion Data exfiltration malware Exmatter, previously associated with the BlackMatter ransomware gang, now has data corruption capabilities. This could sig...

Learn More
Sep 27, 2022
Threat Actors Utilize PowerPoint Files to Distribute Graphite Malware

Threat Actors Utilize PowerPoint Files to Distribute Graphite Malware Threat actors started utilizing PowerPoint presentations as a code execution method and delivering Graphite malware in targeted at...

Learn More
Sep 26, 2022
FARGO Ransomware Targets Vulnerable Microsoft SQL Servers

FARGO Ransomware Targets Vulnerable Microsoft SQL Servers Microsoft SQL database servers are the target of a new ransomware attack campaign called FARGO ransomware. FARGO, also known as TargetCom...

Learn More
Sep 26, 2022
Sophos Firewall Patch Released for Actively Exploited Zero-Day RCE Vul...

Sophos Firewall Patch Released for Actively Exploited Zero-Day RCE Vulnerability Sophos released a patch for a flaw discovered in their firewall product. Tracked as CVE-2022-3236 (CVSS score...

Learn More
Sep 26, 2022
The Week in Dark Web – 26 September 2022 – Access Sales and Data Leaks...

The Week in Dark Web – 26 September 2022 – Access Sales and Data Leaks Powered by DarkMirror™ Threat actors threaten organizations by selling databases containing sensitive data and accesses that coul...

Learn More
Sep 23, 2022
Ten Things Will Change Cybersecurity in 2023

Ten Things Will Change Cybersecurity in 2023 Businesses come across more significant cybersecurity challenges as technology evolves. The digital environment and the attack surface are changing every s...

Learn More
Sep 23, 2022
A New Attack Wave Targeting Critical Magento Vulnerability

A New Attack Wave Targeting Critical Magento Vulnerability E-commerce platform Magento has become a frequent target for hackers. More attempts have been made to exploit CVE-2022-24086&n...

Learn More
Sep 23, 2022
CISA Urges to Patch ManageEngine Against RCE Vulnerability

CISA Urges to Patch ManageEngine Against RCE Vulnerability CISA has added a new critical vulnerability to its Known Exploited Vulnerabilities Catalog. The flaw exists in several ManageEngine prod...

Learn More
Sep 22, 2022
Top 10 Threat Intelligence Resources to Follow

Top 10 Threat Intelligence Resources to Follow Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there...

Learn More
Sep 22, 2022
Python Flaw Unfixed for 15 Years: 350,000 Projects Deemed Vulnerable

Python Flaw Unfixed for 15 Years: 350,000 Projects Deemed Vulnerable A flaw in the Python tarfile module has gone unfixed for 15 years. 350,000 open-source projects are considered vulnerable. The fla...

Learn More