Aug 05, 2022
Dark Utilities Platform Provides C2 Server for Threat Actors

Dark Utilities Platform Provides C2 Server for Threat Actors Cybercriminals can now use a new service called Dark Utilities to build up a command and control (C2) center for their malicious activities...

Learn More
Aug 04, 2022
Cisco Fixed RCE and Command Injection Flaws in VPN Router Series

Cisco Fixed RCE and Command Injection Flaws in VPN Router Series Cisco released fixes for several vulnerabilities in its VPN routers. Affected products could be subject to remote code execution, comma...

Learn More
Aug 04, 2022
Dark Web Profile: Vice Society Ransomware Group

Dark Web Profile: Vice Society Ransomware Group By SOCRadar Research In recent years, the ransomware threat has snowballed. Many new actors have begun to show their heads in the scene and target organ...

Learn More
Aug 03, 2022
IBM Report: Data Breach Costs Higher Than Ever

IBM Report: Data Breach Costs Higher Than Ever IBM has published the Cost of a Data Breach report, which reveals how organizations from different industries are affected by data breaches and set futur...

Learn More
Aug 03, 2022
VMware Fixes Critical Vulnerabilities Including RCE and Authentication...

VMware Fixes Critical Vulnerabilities Including RCE and Authentication Bypass With the security update released Tuesday, VMware fixed ten vulnerabilities affecting some of its products. One is the aut...

Learn More
Aug 02, 2022
How to Detect Reconnaissance Using MITRE ATT&CK Framework

How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...

Learn More
Aug 02, 2022
Banking Trojans Distributed on Google Play Store in DawDropper Campaig...

Banking Trojans Distributed on Google Play Store in DawDropper Campaign Cybersecurity researchers have uncovered a new campaign to distribute banking trojans on the Google Play Store. These ̶...

Learn More
Aug 01, 2022
Insider Threats Rising: Average Cost of an Incident is $6.6M

Insider Threats Rising: Average Cost of an Incident is $6.6M The annual Cost of a Data Breach Report, featuring research by Ponemon Institute, offers insights from 550 actual breaches to help you unde...

Learn More
Jul 29, 2022
Vulnerabilities in Atlassian Confluence Actively Exploited

Vulnerabilities in Atlassian Confluence Actively Exploited The critical hard-coded credentials flaw in Atlassian’s Questions For Confluence app (CVE-2022-26138) has been actively explo...

Learn More
Jul 28, 2022
Top 5 Free Attack Surface Management Tools

Top 5 Free Attack Surface Management Tools Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization’s I...

Learn More
Jul 28, 2022
Threats of Commercialized Malware: Knotweed

Threats of Commercialized Malware: Knotweed Microsoft associates the private sector offensive actor (PSOA) Knotweed with the Austrian spyware distributor DSIRF. DSIRF, founded in 2016, advertises...

Learn More
Jul 28, 2022
Does the Killnet Pose a Serious Threat to Our Industry?

Does the Killnet Pose a Serious Threat to Our Industry? Killnet is a pro-Russian hacktivist group known for its DoS and DDoS attacks on government institutions and companies in multiple countries whil...

Learn More
Jul 27, 2022
Ducktail Malware Targets Facebook Business Accounts via LinkedIn Phish...

Ducktail Malware Targets Facebook Business Accounts via LinkedIn Phishing Attack A new phishing attempt with the codename Ducktail is in progress and targets LinkedIn users who work in the field to hi...

Learn More
Jul 26, 2022
What is Domain Hijacking and How to Prevent

What is Domain Hijacking and How to Prevent Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations....

Learn More
Jul 26, 2022
Zero-Day Security Flaw Exploited in PrestaShop Websites

Zero-Day Security Flaw Exploited in PrestaShop Websites Attackers discovered a way to exploit a vulnerability in PrestaShop servers. The actively exploited zero-day, CVE-2022-36408, allows attackers t...

Learn More
Jul 25, 2022
Top 5 Tools for Phishing Domain Detection

Top 5 Tools for Phishing Domain Detection Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against ...

Learn More
Jul 25, 2022
SonicWall Released Hotfix for Critical SQL Injection Flaw

SonicWall Released Hotfix for Critical SQL Injection Flaw A severe SQL injection vulnerability has been reported by network security vendor SonicWall in their security advisory. It affects the&nb...

Learn More
Jul 22, 2022
What is Deep Web Monitoring?

What is Deep Web Monitoring? There are a variety of network monitoring and perimeter protection solutions available for both personal and commercial networks. Nevertheless, even the most protected bus...

Learn More
Jul 22, 2022
Cisco Released Patches for Multiple Nexus Dashboard Vulnerabilities

Cisco Released Patches for Multiple Nexus Dashboard Vulnerabilities Cisco announced that it has released security updates for vulnerabilities detected in the Nexus Dashboard. The security flaws i...

Learn More
Jul 21, 2022
Dark Web Threat Profile: pompompurin

Dark Web Threat Profile: pompompurin [Update] June 26, 2023: BreachForums was seized by the FBI three months after the arrest of its administrator. Added the subheading “FBI Seizes BreachForums After ...

Learn More