What Do You Need to Know About the Recent Operation of FSB Russia on R...
What Do You Need to Know About the Recent Operation of FSB Russia on REvil Ransomware Group On January 14, 2022, the Russian Federal Security Service (FSB) arrested members of the REvilransomware gang...
The Week in Dark Web - 17 January 2022 - Access Sales and Data Leaks
The Week in Dark Web – 17 January 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwar...
What is a Security Operations Center (SOC)? (Ultimate Guide)
What is a Security Operations Center (SOC)? (Ultimate Guide) A Security Operation Center (SOC) is a centralized function inside an organization that uses people, processes, and technology to continual...
Cisco Fixes a Critical Flaw in Unified CCMP and Unified CCDM
Cisco Fixes a Critical Flaw in Unified CCMP and Unified CCDM Cisco fixed a critical privilege escalation vulnerability, tracked as CVE-2022-20658, in Unified CCMP and Unified CCDM.On the oth...
What is Cryptocurrency Mining Malware?
What is Cryptocurrency Mining Malware? A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems ...
How Does Cyber Security Support Business Intelligence?
How Does Cyber Security Support Business Intelligence? The second guide that we have prepared for cyber security experts and administrators is about “business intelligence”. Cybercrime has catastrophi...
Microsoft Fixes Six Zero-Days and 97 Flaws Including an Exchange Vulne...
Microsoft Fixes Six Zero-Days and 97 Flaws Including an Exchange Vulnerability Microsoft fixes a total of 97 security vulnerabilities, including six zero-day vulnerabilities. In an update, the c...
AvosLocker's New Linux Variant Targets VMware ESXi Servers
AvosLocker’s New Linux Variant Targets VMware ESXi Servers A Linux variant of the AvosLocker gang, which first appeared in the summer of 2021 and conducted its operations in RaaS style, targetin...
The Week in Dark Web - 10 January 2022 - Access Sales and Data Leaks
The Week in Dark Web – 10 January 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwar...
SonicWall Patches Y2K22 Bug in Email Security
SonicWall Patches Y2K22 Bug in Email Security Maybe you remember the Y2K problem, a problem that refers to a computer glitch identified in some software systems that could have disrupted the transitio...
How to Protect Employees Against Phishing Attacks?
How to Protect Employees Against Phishing Attacks? The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an ...
What Do You Need To Know About Cloud Web Application Firewall (WAF)
What Do You Need To Know About Cloud Web Application Firewall (WAF) A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and t...
VMware Fixes the Critical Vulnerability Affecting Some Products
VMware Fixes the Critical Vulnerability Affecting Some Products Virtualization solutions continue to be one of the primary targets of cyber threats as they are widely used in companies. &nbs...
APT Profile: Who is Phosphorus?
APT Profile: Who is Phosphorus? Phosphorus is an attack group linked to the Iranian government, also known as Charming Kitten, Ajax Security, NewsBeef, which has been very active since 2017. Its targe...
Windows Server Update Fixes Remote Desktop Issues
Windows Server Update Fixes Remote Desktop Issues Microsoft has released an update that fixes remote desktop vulnerabilities detected on Windows Server. On January 4, in the announcement sha...
Cyber Law Round-Up: SOCRadar’s Curation for Recent Cyber Legislations ...
Cyber Law Round-Up: SOCRadar’s Curation for Recent Cyber Legislations Across the World in 2021 As security threats and ransomware incidents ramp up, governments rush to keep up with this pace by devel...
Top 5 Cyber Attacks in the Asia Pacific (APAC) in 2021
Top 5 Cyber Attacks in the Asia Pacific (APAC) in 2021 As the end of the year approaches, we continue to compile the prominent cyber security news of the year specific to the regions. Address to four ...
Vulnerability Round-Up: SOCRadar's Curation of Critical Vulnerabilitie...
Vulnerability Round-Up: SOCRadar’s Curation of Critical Vulnerabilities for 2021 Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vul...
How to Minimize Your Attack Surface in 5 Ways
How to Minimize Your Attack Surface in 5 Ways Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minima...
What is a Rootkit and How to Detect It
What is a Rootkit and How to Detect It A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can a...