Aug 18, 2022
Top 10 Threat Intelligence Browser Extensions for SOC Analysts

Top 10 Threat Intelligence Browser Extensions for SOC Analysts Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity special...

Learn More
Aug 17, 2022
Dark Web Stories: How Hackers Advertising on Black Market?

Dark Web Stories: How Hackers Advertising on Black Market? It is highly possible to come across the term black market in movies, news, debates, etc. In real life, the black market is a vast concept th...

Learn More
Aug 17, 2022
Exploit Code of Critical Realtek SDK Vulnerability Released

Exploit Code of Critical Realtek SDK Vulnerability Released An exploit code is accessible for the Realtek eCos SDK‘s high severity security flaw. The flaw could allow unauthenticated remote atta...

Learn More
Aug 17, 2022
MailChimp Breached Shortly After Twilio Incident

MailChimp Breached Shortly After Twilio Incident DigitalOcean became aware of a breach after MailChimp suddenly suspended its account on August 8. A recent security breach at MailChimp allowed users’ ...

Learn More
Aug 16, 2022
What is Strategic Cyber Intelligence and How to Use it

What is Strategic Cyber Intelligence and How to Use it As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes a...

Learn More
Aug 16, 2022
Banking Trojan SOVA Has New Version with Updated Features

Banking Trojan SOVA Has New Version with Updated Features SOVA was announced as an Android banking trojan back in September 2021. Although it is currently under development, it already offer...

Learn More
Aug 15, 2022
Top 10 Data Breaches So Far in 2022

Top 10 Data Breaches So Far in 2022 Data breach cases are increasing as cyber security incidents rise. According to statistics, more than 90% of data breaches are caused by cyber-attacks. However, dat...

Learn More
Aug 15, 2022
Could China – Taiwan Cyber Conflict Deepen the Global Chip Crisis?

Could China – Taiwan Cyber Conflict Deepen the Global Chip Crisis? The US House of Representatives speaker Nancy Pelosi arrived in Taiwan on the evening of August 2. She’s the first US represent...

Learn More
Aug 15, 2022
Vulnerability Affecting Some Palo Alto Products Allows RDoS Attacks

Vulnerability Affecting Some Palo Alto Products Allows RDoS Attacks A service provider recently notified Palo Alto Networks about an attempted reflected denial-of-service (RDoS) attack. The ...

Learn More
Aug 12, 2022
Top 10 Search Engines for Pentesters and Bug Bounty Hunters

Top 10 Search Engines for Pentesters and Bug Bounty Hunters Gathering information is the first step in identifying security vulnerabilities and analyzing risks. To collect data, security professionals...

Learn More
Aug 12, 2022
Over 1,000 Zimbra Servers Compromised by Auth Bypass Vulnerability

Over 1,000 Zimbra Servers Compromised by Auth Bypass Vulnerability Zimbra Collaboration Suite (ZCS) was found to have an actively exploited authentication bypass vulnerability. The vulnerability is tr...

Learn More
Aug 11, 2022
SOCRadar's Free IOC Search & Enrichment Service is Now Available

SOCRadar’s Free IOC Search & Enrichment Service is Now Available IOCs are a vital component of the threat hunting process, essential to detect and isolate advanced cyber threats. As a critic...

Learn More
Aug 11, 2022
How Did Cisco Get Hacked, What Was Leaked, and What Did We Learn?

How Did Cisco Get Hacked, What Was Leaked, and What Did We Learn? ...

Learn More
Aug 10, 2022
Traffic Light Protocol is Updated to Version 2.0

Traffic Light Protocol is Updated to Version 2.0 The Forum of Incident Response and Security Teams (FIRST) has shared an update for Traffic Light Protocol (TLP), denominating the latest version a...

Learn More
Aug 10, 2022
Microsoft Fixes 121 Security Flaws in August Patch Tuesday

Microsoft Fixes 121 Security Flaws in August Patch Tuesday In this month’s Patch Tuesday, Microsoft fixed 121 flaws in total, including two zero-day vulnerabilities that are actively exploited. ...

Learn More
Aug 09, 2022
Why are Russian Threat Actors Targeting Azerbaijan?

Why are Russian Threat Actors Targeting Azerbaijan? Since the start of the Russian invasion of Ukraine, Ukrainian organizations have been bombarded with cyberattacks executed by Russian threat actors....

Learn More
Aug 09, 2022
Critical Vulnerabilities in Exim Email Server Allow RCE

Critical Vulnerabilities in Exim Email Server Allow RCE Two critical vulnerabilities discovered in the open source email server Exim threaten over 500,000 email servers. One of the vulnerabilities all...

Learn More
Aug 08, 2022
Top 10 DNS Threat Analysis and Monitoring Tools

Top 10 DNS Threat Analysis and Monitoring Tools DNS converts easy-to-remember domain names into numeric IP addresses determined by the primary network protocols of the computer services and devices to...

Learn More
Aug 08, 2022
Linux Malware RapperBot Brute Forcing SSH Servers

Linux Malware RapperBot Brute Forcing SSH Servers RapperBot is an IoT botnet malware that has spread through brute force since it was first identified in June 2022. Over 3,500 unique IPs were utilized...

Learn More
Aug 05, 2022
Gartner: EASM and DRPS Services Rise in the Market

Gartner: EASM and DRPS Services Rise in the Market Gartner shared HypeCyclefor Security Operations, 2022, which it publishes periodically and aims to provide insight into cyber security operations and...

Learn More