What is Network Port?
What is Network Port? Computers must have an IP address to communicate with each other. IP addresses are divided into ports, which means virtual buses. It means port. However, its equivalent in comput...
Dozens of WordPress Plugins Backdoored in Supply Chain Attack
Dozens of WordPress Plugins Backdoored in Supply Chain Attack Dozens of WordPress themes and plugins hosted on a developer’s website were backdoored in a supply chain attack. with malicious code in Se...
The Week in Dark Web - 24 January 2022 - Ransomware Attacks and Data L...
The Week in Dark Web – 24 January 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ran...
New Free Service from SOCRadar LABS: ‘External Attack Surface’
New Free Service from SOCRadar LABS: ‘External Attack Surface’ At SOCRadar LABS, we’re proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surfac...
SOCRadar New Threat Landscape Report: Financial Institutions are Most ...
SOCRadar New Threat Landscape Report: Financial Institutions are Most Targeted Sector in the UK SOCRadar Threat Landscape Report provides U.K. organizations with an understanding of evolving cyber thr...
What are CVSS Scores?
What are CVSS Scores? The Common Vulnerability Scoring System (also known as CVSS) assigns a number value (0-10) to the severity of a security vulnerability. CVSS scores are often used by security pro...
Microsoft Releases Emergency Updates for Windows Server 2019
Microsoft Releases Emergency Updates for Windows Server 2019 Microsoft has released “out-of-band” emergency updates to fix various critical bugs that emerged after its updates for Jan...
What Do You Need to Know About the Recent Operation of FSB Russia on R...
What Do You Need to Know About the Recent Operation of FSB Russia on REvil Ransomware Group On January 14, 2022, the Russian Federal Security Service (FSB) arrested members of the REvilransomware gang...
The Week in Dark Web - 17 January 2022 - Access Sales and Data Leaks
The Week in Dark Web – 17 January 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwar...
What is a Security Operations Center (SOC)? (Ultimate Guide)
What is a Security Operations Center (SOC)? (Ultimate Guide) A Security Operation Center (SOC) is a centralized function inside an organization that uses people, processes, and technology to continual...
Cisco Fixes a Critical Flaw in Unified CCMP and Unified CCDM
Cisco Fixes a Critical Flaw in Unified CCMP and Unified CCDM Cisco fixed a critical privilege escalation vulnerability, tracked as CVE-2022-20658, in Unified CCMP and Unified CCDM.On the oth...
What is Cryptocurrency Mining Malware?
What is Cryptocurrency Mining Malware? A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems ...
How Does Cyber Security Support Business Intelligence?
How Does Cyber Security Support Business Intelligence? The second guide that we have prepared for cyber security experts and administrators is about “business intelligence”. Cybercrime has catastrophi...
Microsoft Fixes Six Zero-Days and 97 Flaws Including an Exchange Vulne...
Microsoft Fixes Six Zero-Days and 97 Flaws Including an Exchange Vulnerability Microsoft fixes a total of 97 security vulnerabilities, including six zero-day vulnerabilities. In an update, the c...
AvosLocker's New Linux Variant Targets VMware ESXi Servers
AvosLocker’s New Linux Variant Targets VMware ESXi Servers A Linux variant of the AvosLocker gang, which first appeared in the summer of 2021 and conducted its operations in RaaS style, targetin...
The Week in Dark Web - 10 January 2022 - Access Sales and Data Leaks
The Week in Dark Web – 10 January 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwar...
SonicWall Patches Y2K22 Bug in Email Security
SonicWall Patches Y2K22 Bug in Email Security Maybe you remember the Y2K problem, a problem that refers to a computer glitch identified in some software systems that could have disrupted the transitio...
How to Protect Employees Against Phishing Attacks?
How to Protect Employees Against Phishing Attacks? The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an ...
What Do You Need To Know About Cloud Web Application Firewall (WAF)
What Do You Need To Know About Cloud Web Application Firewall (WAF) A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and t...
VMware Fixes the Critical Vulnerability Affecting Some Products
VMware Fixes the Critical Vulnerability Affecting Some Products Virtualization solutions continue to be one of the primary targets of cyber threats as they are widely used in companies. &nbs...