How Should CISOs Prepare on the Current Cyberthreat Landscape?
How Should CISOs Prepare on the Current Cyberthreat Landscape? Recent research by John Sakellariadis for the Atlantic Council delves deeper into the emergence of ransomware over the past ten...
Top Critical Vulnerabilities Used by Ransomware Groups
Top Critical Vulnerabilities Used by Ransomware Groups As ransomware attacks have grown in popularity recently, researchers have begun compiling an easy-to-follow list of vulnerabilities exploited by ...
The Week in Dark Web – 7 November 2022 – Data Leaks and Access Sales...
The Week in Dark Web – 7 November 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...
Hacktivist Group Black Reward Leaked Iran's Nuclear Program Secrets
Hacktivist Group Black Reward Leaked Iran’s Nuclear Program Secrets Iran’s Atomic Energy Organization announced on Sunday, October 23, that foreign country-backed hackers had hacked an ema...
Fortinet Fixes Six Serious Vulnerabilities
Fortinet Fixes Six Serious Vulnerabilities Including six vulnerabilities with a high severity rating, Fortinet warned customers on Tuesday (1 November) of 16 vulnerabilities found in the company’...
Dark Web Stories: DDoS as a Service
Dark Web Stories: DDoS as a Service DoS (Denial-of-service attacks) are frequently encountered in the cyber world and result in violation of the availability of online services. When this attack is ma...
OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed
OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed On November 1, Version 3.0.7 of OpenSSL was released to fix two high-severity vulnerabilities (CVE-2022-3602 and ...
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial ...
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial Industry In the first eight months of 2022, the SOCRadar CTIA Team examined 1,700 ransomware threats published on dark web forums ...
A New Rising Social Engineering Trend: Callback Phishing
A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales...
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...
MFA Bypass Techniques: How Does it Work?
MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...
Halloween Special: The Spookiest Cybersecurity Stories
Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notificat...
What Do You Need to Know About New Critical Vulnerability in OpenSSL
What Do You Need to Know About New Critical Vulnerability in OpenSSL Version 3.0.7 of OpenSSL is expected to be released on November 1 to fix a critical vulnerability that has not yet been made public...
Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer
Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer On Tuesday, October 25th, 2022, a federal grand jury indictment charges a Ukrainian national, Mark Sokolovsky, 26, also known as P...
Ransomware Strikes Thailand Manufacturing Industry
Ransomware Strikes Thailand Manufacturing Industry Data leaks are a significant concern for every organization. Between September 2021 and September 2022, theft or leak of data has been a big issue fo...
Cloud Security Module: Minimize Risk of Misconfigured Buckets
Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...
22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution
22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution CVE-2022-35737 is a vulnerability caused by the “Improper Validation of Array Index.” The vulnerability has a ...
Financial Industry Shaken by DDoS Attacks
Financial Industry Shaken by DDoS Attacks Distributed denial-of-service (DDoS) attacks are one of the most common techniques along with cyber criminals. Despite being temporary, DDoS attacks can have ...
Apple Releases Patch for Exploited Zero-Day
Apple Releases Patch for Exploited Zero-Day Threat actors actively exploiting the remote code execution vulnerability tagged CVE-2022-42827. On compromised iOS devices, an application may be able...
The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks...
The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...