Top 10 Threat Intelligence Resources to Follow
Top 10 Threat Intelligence Resources to Follow Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there...
Python Flaw Unfixed for 15 Years: 350,000 Projects Deemed Vulnerable
Python Flaw Unfixed for 15 Years: 350,000 Projects Deemed Vulnerable A flaw in the Python tarfile module has gone unfixed for 15 years. 350,000 open-source projects are considered vulnerable. The fla...
Threat Actors Exploit Atlassian Confluence RCE Flaw to Install Crypto ...
Threat Actors Exploit Atlassian Confluence RCE Flaw to Install Crypto Miners Unpatched Atlassian Confluence Server instances are vulnerable to a critical RCE flaw. The flaw, tracked as CVE-2...
Top 10 Free Cybersecurity Solutions for SMB
Top 10 Free Cybersecurity Solutions for SMB Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just ...
$162M Stolen from Digital Asset Trader Wintermute
$162M Stolen from Digital Asset Trader Wintermute Evgeny Gaevoy, the CEO of Wintermute, said earlier today that the company had been hacked and had lost $162.2 million in DeFi operations. The Profani...
Cobalt Strike Rolls Out an Update for XSS Vulnerability
Cobalt Strike Rolls Out an Update for XSS Vulnerability Cobalt Strike 4.7.1 out-of-band update fixed an issue in version 4.7 that the affected users reported. There was no workaround for the problem. ...
Highlights from SOCRadar Cyberwatch September Webinar
Highlights from SOCRadar Cyberwatch September Webinar The first of SOCRadar’s Cyberwatch webinar series took place yesterday. Cyberwatch September, which covers significant cyber incidents, emer...
Microsoft and VMware Warn of Ongoing Chromeloader Malware Campaign
Microsoft and VMware Warn of Ongoing Chromeloader Malware Campaign Microsoft and VMware cautioned users about a widely spread Chromeloader malware campaign. The malware is said to have evolv...
The Week in Dark Web – 20 September 2022 – Data Leaks
The Week in Dark Web – 20 September 2022 – Data Leaks Powered by DarkMirror™ Last week, threat actors continued selling leaked government and private organizations’ databases. The most notable l...
Diplomatic Crisis: Cyber Attack from Iran to Albania
Diplomatic Crisis: Cyber Attack from Iran to Albania On September 7, Edi Rama –the Prime Minister of Albania– released a video message on the website of the Government of Albania. Accordin...
Why are Threat Actors Targeting Indonesia?
Why are Threat Actors Targeting Indonesia? On September 3, Indonesia hiked fuel prices by 30%, stating that petrol and diesel prices are still low by world standards, but subsidies are unsustainable. ...
Trend Micro Warnes for Actively Exploited RCE Flaw in Apex One
Trend Micro Warnes for Actively Exploited RCE Flaw in Apex One Trend Micro recently released a patch for an actively exploited flaw in its endpoint security platform, Apex One. The security software p...
Hacker Breached Nearly Entire Uber IT System
Hacker Breached Nearly Entire Uber IT System Transportation provider giant Uber is currently investigating a cyberattack. Following a network intrusion, multiple instances used by the company have bee...
WordPress Sites Compromised Due to FishPig Supply Chain Attack
WordPress Sites Compromised Due to FishPig Supply Chain Attack Numerous attack scenarios were observed targeting WordPress recently. These attacks abused WordPress plugins and tools to exploit website...
Italy Threat Landscape Report: Skyrocketing Data Theft
Italy Threat Landscape Report: Skyrocketing Data Theft Cyber risks have reached a level that all organizations cannot ignore. All governments worldwide are taking measures to take action against poten...
Cybersecurity Reports Worth Checking Out in 2022
Cybersecurity Reports Worth Checking Out in 2022 Cyberthreats evolve every second, making it impossible to forecast the state in the future. We need insights to understand how important it is to maint...
Loader Malware Emotet is Now Led by Quantum and BlackCat
Loader Malware Emotet is Now Led by Quantum and BlackCat Emotet (also known as SpmTools) is a sophisticated, modular banking trojan. Emotetmostly serves as a downloader or dropper of other bankin...
September Patch Tuesday Fixes Actively Exploited Zero Day and RCE Flaw...
September Patch Tuesday Fixes Actively Exploited Zero Day and RCE Flaws Microsoft’s September Patch Tuesday update includes fixes for 63 vulnerabilities. There are five high-severity remote code...
Vote for SOCRadar at the Computing Security Awards 2022!
Vote for SOCRadar at the Computing Security Awards 2022! SOCRadar is proud to be among the finalists in the “Threat Intelligence Award” category this year at the Computing Security Awards ...
The Week in Dark Web – 13 September 2022 – Database Leaks
The Week in Dark Web – 13 September 2022 – Database Leaks Powered by DarkMirror™ Threat actors mostly sold leaked databases last week. Among them were datasets that included important government data....