
The Week in Dark Web – 13 September 2022 – Database Leaks
The Week in Dark Web – 13 September 2022 – Database Leaks Powered by DarkMirror™ Threat actors mostly sold leaked databases last week. Among them were datasets that included important government data....

High-Severity Firmware Flaws in HP Devices Yet to Be Patched
High-Severity Firmware Flaws in HP Devices Yet to Be Patched Specific HP PC models’ BIOS has flaws that could allow arbitrary code execution, escalation of privilege, denial of service, and info...

Lampion Banking Malware Reappears in WeTransfer Phishing Attacks
Lampion Banking Malware Reappears in WeTransfer Phishing Attacks Lampion malware operators use the free file-sharing platform WeTransfer to perform phishing attacks. This way, attackers can avoid secu...

Recent Attack Types Against Cloud Infrastructures
Recent Attack Types Against Cloud Infrastructures ...

Patch Released for RCE Vulnerability in pfSense Firewall
Patch Released for RCE Vulnerability in pfSense Firewall A critical vulnerability has been discovered in a plugin of Netgate’s pfSense firewall. The flaw is tracked as CVE-2022-31814&n...

Cisco Released Patches for Vulnerabilities Affecting Several Products
Cisco Released Patches for Vulnerabilities Affecting Several Products Three security issues impacting Cisco products were patched on Wednesday, including a high-severity vulnerability discov...

Zyxel NAS Devices are Affected by a Critical RCE Vulnerability
Zyxel NAS Devices are Affected by a Critical RCE Vulnerability Zyxel has announced fixes for a severe format string issue in its network attached storage products. The Taiwanese network giant’s ...

How XDR Powers Rapid Attack Detection and Response
How XDR Powers Rapid Attack Detection and Response A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends ca...

Illegal Marketplace WT1SHOP Seized After Nearly 6M Records Compromised...
Illegal Marketplace WT1SHOP Seized After Nearly 6M Records Compromised A global law enforcement operation has taken down the website and domains for WT1SHOP. WT1SHOP is an illegal marketplace often ...

Mirai Variant MooBot Targets RCE Vulnerabilities in D-Link Routers
Mirai Variant MooBot Targets RCE Vulnerabilities in D-Link Routers MooBot botnet is back for new attacks. The variant of the Mirai malware started a new campaign last month to exploit critical vulnera...

The Week in Dark Web – 6 September 2022 – Access and Vulnerability Sal...
The Week in Dark Web – 6 September 2022 – Access and Vulnerability Sales Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Threat actors mostly sold access...

TikTok Denies Allegations of a 2.05 Billion Record Data Breach
TikTok Denies Allegations of a 2.05 Billion Record Data Breach Popular social media platform TikTok rejected claims that it had been compromised by threat actors who claimed to have obtained access to...

QNAP Fixes Zero-Day Recently Leveraged by DeadBolt Ransomware
QNAP Fixes Zero-Day Recently Leveraged by DeadBolt Ransomware The Taiwanese company QNAP cautions customers about DeadBolt ransomware attacks upon exploiting a zero-day vulnerabili...

What is Account Takeover and How to Prevent It?
What is Account Takeover and How to Prevent It? ...

Major Cyberattacks in Review: August 2022
Major Cyberattacks in Review: August 2022 Threat actors did not stay idle in August, and as always, they continued their attacks on small or large companies, government organizations, and critical in...

Attackers Targeting Banking Credentials: American Express and Google P...
Attackers Targeting Banking Credentials: American Express and Google Play Users at Risk Phishing has changed significantly over the past ten years, and scammers now have sophisticated tools to use fak...

What is Malvertising & How to Stop Ad Malware?
What is Malvertising & How to Stop Ad Malware? ...

1,800 Apps with Hardcoded AWS Credentials Show Supply Chain Risks
1,800 Apps with Hardcoded AWS Credentials Show Supply Chain Risks More than 1,800 mobile applications have hardcoded AWS credentials, according to Symantec, which has issued a warning about the p...

What is Customer Identity and Access Management (CIAM)?
What is Customer Identity and Access Management (CIAM)? CIAM (Customer identity and access management) is part of the identity and access management (IAM) system integrated into applications for exter...

Spyware Firm Sold Android and iOS RCE Exploit for €8 Million
Spyware Firm Sold Android and iOS RCE Exploit for €8 Million Intellexa, a spyware firm that originated in Greece, has entered the market recently. Its work is similar to Pegasus Spyware and offers RCE...