Nov 14, 2022
Penetration Testing vs. External Attack Surface Management vs. Vulnera...

Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks,...

Learn More
Nov 13, 2022
All You Need to Know About the Latest OpenLiteSpeed Web Server Vulnera...

All You Need to Know About the Latest OpenLiteSpeed Web Server Vulnerabilities Researchers have discovered three different vulnerabilities, two of which are assigned a high severity rating and respect...

Learn More
Nov 11, 2022
What is Password Analyzer?

What is Password Analyzer? A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerab...

Learn More
Nov 10, 2022
The Ultimate OSINT Handbook on Personal Information

The Ultimate OSINT Handbook on Personal Information OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to...

Learn More
Nov 10, 2022
Major Cyber Attacks in Review: October 2022

Major Cyber Attacks in Review: October 2022 Major cyberattacks of the last month include data leaks, security breaches, phishing attacks, and much more. Here are the top cyber incidents of October 202...

Learn More
Nov 09, 2022
Vulnerability Management Best Practices

Vulnerability Management Best Practices Every day, new vulnerabilities emerge, and multiplying proliferating vulnerabilities throughout today’s complex technology contexts yield a never-ending risk ha...

Learn More
Nov 09, 2022
Microsoft November 2022 Patch Tuesday Fixed 11 Critical Vulnerabilitie...

Microsoft November 2022 Patch Tuesday Fixed 11 Critical Vulnerabilities and 6 Zero-Days ...

Learn More
Nov 09, 2022
All You Need To Know About the Critical Citrix Vulnerabilities

All You Need To Know About the Critical Citrix Vulnerabilities In a security bulletin on November 08, 2022, Citrix warned its customers using Citrix ADC and Citrix Gateway to insta...

Learn More
Nov 08, 2022
How Should CISOs Prepare on the Current Cyberthreat Landscape?

How Should CISOs Prepare on the Current Cyberthreat Landscape? Recent research by John Sakellariadis for the Atlantic Council delves deeper into the emergence of ransomware over the past ten...

Learn More
Nov 07, 2022
Top Critical Vulnerabilities Used by Ransomware Groups

Top Critical Vulnerabilities Used by Ransomware Groups As ransomware attacks have grown in popularity recently, researchers have begun compiling an easy-to-follow list of vulnerabilities exploited by ...

Learn More
Nov 07, 2022
The Week in Dark Web – 7 November 2022 – Data Leaks and Access Sales...

The Week in Dark Web – 7 November 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...

Learn More
Nov 04, 2022
Hacktivist Group Black Reward Leaked Iran's Nuclear Program Secrets

Hacktivist Group Black Reward Leaked Iran’s Nuclear Program Secrets Iran’s Atomic Energy Organization announced on Sunday, October 23, that foreign country-backed hackers had hacked an ema...

Learn More
Nov 03, 2022
Fortinet Fixes Six Serious Vulnerabilities

Fortinet Fixes Six Serious Vulnerabilities Including six vulnerabilities with a high severity rating, Fortinet warned customers on Tuesday (1 November) of 16 vulnerabilities found in the company’...

Learn More
Nov 02, 2022
Dark Web Stories: DDoS as a Service

Dark Web Stories: DDoS as a Service DoS (Denial-of-service attacks) are frequently encountered in the cyber world and result in violation of the availability of online services. When this attack is ma...

Learn More
Nov 01, 2022
OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed

OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed On November 1, Version 3.0.7 of OpenSSL was released to fix two high-severity vulnerabilities (CVE-2022-3602 and ...

Learn More
Nov 01, 2022
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial ...

LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial Industry In the first eight months of 2022, the SOCRadar CTIA Team examined 1,700 ransomware threats published on dark web forums ...

Learn More
Nov 01, 2022
A New Rising Social Engineering Trend: Callback Phishing

A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...

Learn More
Oct 31, 2022
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales...

The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...

Learn More
Oct 31, 2022
MFA Bypass Techniques: How Does it Work?

MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...

Learn More
Oct 31, 2022
Halloween Special: The Spookiest Cybersecurity Stories

Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notification wa...

Learn More