Penetration Testing vs. External Attack Surface Management vs. Vulnera...
Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks,...
All You Need to Know About the Latest OpenLiteSpeed Web Server Vulnera...
All You Need to Know About the Latest OpenLiteSpeed Web Server Vulnerabilities Researchers have discovered three different vulnerabilities, two of which are assigned a high severity rating and respect...
What is Password Analyzer?
What is Password Analyzer? A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerab...
The Ultimate OSINT Handbook on Personal Information
The Ultimate OSINT Handbook on Personal Information OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to...
Major Cyber Attacks in Review: October 2022
Major Cyber Attacks in Review: October 2022 Major cyberattacks of the last month include data leaks, security breaches, phishing attacks, and much more. Here are the top cyber incidents of October 202...
Vulnerability Management Best Practices
Vulnerability Management Best Practices Every day, new vulnerabilities emerge, and multiplying proliferating vulnerabilities throughout today’s complex technology contexts yield a never-ending risk ha...
Microsoft November 2022 Patch Tuesday Fixed 11 Critical Vulnerabilitie...
Microsoft November 2022 Patch Tuesday Fixed 11 Critical Vulnerabilities and 6 Zero-Days ...
All You Need To Know About the Critical Citrix Vulnerabilities
All You Need To Know About the Critical Citrix Vulnerabilities In a security bulletin on November 08, 2022, Citrix warned its customers using Citrix ADC and Citrix Gateway to insta...
How Should CISOs Prepare on the Current Cyberthreat Landscape?
How Should CISOs Prepare on the Current Cyberthreat Landscape? Recent research by John Sakellariadis for the Atlantic Council delves deeper into the emergence of ransomware over the past ten...
Top Critical Vulnerabilities Used by Ransomware Groups
Top Critical Vulnerabilities Used by Ransomware Groups As ransomware attacks have grown in popularity recently, researchers have begun compiling an easy-to-follow list of vulnerabilities exploited by ...
The Week in Dark Web – 7 November 2022 – Data Leaks and Access Sales...
The Week in Dark Web – 7 November 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...
Hacktivist Group Black Reward Leaked Iran's Nuclear Program Secrets
Hacktivist Group Black Reward Leaked Iran’s Nuclear Program Secrets Iran’s Atomic Energy Organization announced on Sunday, October 23, that foreign country-backed hackers had hacked an ema...
Fortinet Fixes Six Serious Vulnerabilities
Fortinet Fixes Six Serious Vulnerabilities Including six vulnerabilities with a high severity rating, Fortinet warned customers on Tuesday (1 November) of 16 vulnerabilities found in the company’...
Dark Web Stories: DDoS as a Service
Dark Web Stories: DDoS as a Service DoS (Denial-of-service attacks) are frequently encountered in the cyber world and result in violation of the availability of online services. When this attack is ma...
OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed
OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed On November 1, Version 3.0.7 of OpenSSL was released to fix two high-severity vulnerabilities (CVE-2022-3602 and ...
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial ...
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial Industry In the first eight months of 2022, the SOCRadar CTIA Team examined 1,700 ransomware threats published on dark web forums ...
A New Rising Social Engineering Trend: Callback Phishing
A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales...
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...
MFA Bypass Techniques: How Does it Work?
MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...
Halloween Special: The Spookiest Cybersecurity Stories
Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notification wa...