
Countering Nation-State Cyber Attacks with Threat Intelligence
Countering Nation-State Cyber Attacks with Threat Intelligence In recent years, attacks targeting critical infrastructures and political figures of states have increased. These attacks are o...

Major Cyberattacks in Review: May 2023
Major Cyberattacks in Review: May 2023 Throughout May 2023, the cybersecurity landscape witnessed a surge in notable cyberattacks. These incidents encompassed supply chain attacks, data breaches,...

Cyclops Ransomware: Cross-Platform Threat with RaaS and Advanced Featu...
Cyclops Ransomware: Cross-Platform Threat with RaaS and Advanced Features [Update] August 7, 2023: After officially rebranding as Knight, Cyclops has shared their new stealer named “Knight steal...

The State of Cybersecurity in Healthcare: A Review of SOCRadar's Healt...
The State of Cybersecurity in Healthcare: A Review of SOCRadar’s Healthcare Threat Landscape Report The cybersecurity landscape in the healthcare industry is becoming increasingly treacherous, as deta...

Zyxel Firewall Flaws Exploited: Urgent Action Required
Zyxel Firewall Flaws Exploited: Urgent Action Required [Update] July 24, 2023: Threat actors are targeting several Zyxel devices with CVE-2023-28771. Fortinet has detected a significant rise in botnet...

Dark Web Profile: Play Ransomware
Dark Web Profile: Play Ransomware [Update] July 22, 2024: “Play Ransomware Broadens Its Scope with New Linux Variant Targeting ESXi” [Update] December 19, 2023: “Collaborative Advisory on Play Ransomw...

Gigabyte Firmware Code Injection: Persistent Backdoor Leads to Supply ...
Gigabyte Firmware Code Injection: Persistent Backdoor Leads to Supply Chain Risks Researchers have expressed concerns about the UEFI firmware found in numerous motherboards by Gigabyte,...

RaidForums Leak, Breached IT Services, and New LockBit Victim
RaidForums Leak, Breached IT Services, and New LockBit Victim Step into the shadowy world of the dark web as we explore this week’s gripping headlines. From the leaked RaidForum database to unau...

How Can Strategic CTI Help CISOs Fulfil Their Task?
How Can Strategic CTI Help CISOs Fulfil Their Task? Cyber threats have an emerging adversarial impact on organizations such as enterprises and governments. In parallel with increasing cyberattacks and...

Attackers Exploit Critical Zero-Day Vulnerability in MOVEit Transfer
Attackers Exploit Critical Zero-Day Vulnerability in MOVEit Transfer [Update] July 18, 2023: A notorious cybercrime group’s MOVEit attack has affected 340 organizations and over 18 million indiv...

Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOA...
Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs) Privacy and surveillance are two sides of a coin, and the conditions that have blurred the boundaries between them have also pa...

CVE-2023-33733 Vulnerability in ReportLab Allows Bypassing Sandbox Res...
CVE-2023-33733 Vulnerability in ReportLab Allows Bypassing Sandbox Restrictions A proof-of-concept (PoC) exploit and a technical write-up for a ReportLab vulnerability are now available. The...

CSP Bypass Unveiled: The Hidden Threat of Bookmarklets
CSP Bypass Unveiled: The Hidden Threat of Bookmarklets A bookmarklet is a primitive version of browser extensions commonly used today. It consists of a bookmark that contains JavaScript code. These bo...

Hacked Healthcare: Rising Security Breaches in the US
Hacked Healthcare: Rising Security Breaches in the US The healthcare industry is an attractive, prime target for ransomware groups; the AIDS Trojan, also known as the PC Cyborg virus, was the fir...

Android Spyware SpinOk Affects Over 420M Installations on Google Play
Android Spyware SpinOk Affects Over 420M Installations on Google Play Researchers have discovered a new Android trojan, and they track it as “SpinOk.” The trojan is distributed a...

How is Threat Intelligence Used to Monitor Criminal Activity on the Da...
How is Threat Intelligence Used to Monitor Criminal Activity on the Dark Web? The dark web is a part of the Internet that differs from the regular Internet as it is a network that offers anonymity and...

Mutation Effect of Babuk Code Leakage: New Ransomware Variants
Mutation Effect of Babuk Code Leakage: New Ransomware Variants Ransomware continues to be a significant concern for individuals and organizations alike. One particular ransomware group, Babuk, made&nb...

Exposed Forum Reveals RaidForums Database: 478K Members' Details Leake...
Exposed Forum Reveals RaidForums Database: 478K Members’ Details Leaked A database for the infamous RaidForums has been made public. An administrator posted the database on a new hacki...

ChatGPT for SOC Analysts
ChatGPT for SOC Analysts ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 million mo...

New RaaS Emerged, RDP Access, Database, and Credit Card Sales
New RaaS Emerged, RDP Access, Database, and Credit Card Sales Welcome to this week’s dark web news summary. We uncover a new ransomware tool called “NoEscape” on the dark web. Credit...