Jul 21, 2022
Atlassian Patched Critical Vulnerability That Affects Confluence Serve...

Atlassian Patched Critical Vulnerability That Affects Confluence Servers Atlassian announced that it has released an update for a critical vulnerability affecting its Confluence Server and Data Center...

Learn More
Jul 20, 2022
What is Spoofing Attack and How to Prevent It?

What is Spoofing Attack and How to Prevent It? In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal m...

Learn More
Jul 20, 2022
Black Basta Ransomware Victim Knauf Forced to Stop Their Services

Black Basta Ransomware Victim Knauf Forced to Stop Their Services Construction materials manufacturer Knauf announced it was the target of a cyberattack by the Black Basta ransomware. The company decl...

Learn More
Jul 19, 2022
How to Build a Proactive Incident Response Plan?

How to Build a Proactive Incident Response Plan? Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. De...

Learn More
Jul 19, 2022
CISA Warned To Patch Actively Exploited Privilege Escalation Vulnerabi...

CISA Warned To Patch Actively Exploited Privilege Escalation Vulnerability On Windows Microsoft discovered a new zero-day vulnerability in Windows products and released a patch. The vulnerability lets...

Learn More
Jul 18, 2022
Juniper Networks Released Fixes For Critical Vulnerabilities

Juniper Networks Released Fixes For Critical Vulnerabilities CISA advised users and administrators to apply recently released fixes in Juniper Networks products due to several critical vulnerabil...

Learn More
Jul 14, 2022
What is Dark Web Monitoring?

What is Dark Web Monitoring? As the most extensive worldwide system that stores information on everything (and almost everyone), the Internet comprises three distinct layers: the visible, the deep, an...

Learn More
Jul 14, 2022
Cyber Kill Chain Model in Cyber Threat Intelligence

Cyber Kill Chain Model in Cyber Threat Intelligence Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks i...

Learn More
Jul 13, 2022
Expectations of SOC Team from CTI

Expectations of SOC Team from CTI Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A ...

Learn More
Jul 12, 2022
Top 5 Dark Web Forums

Top 5 Dark Web Forums There are many hacker forums in the dark web world. Apart from the forums that first come to mind for illegal drug sales, human trafficking, and pornographic content, i...

Learn More
Jul 12, 2022
7 Books Every CISO Bookshelf Should Have

7 Books Every CISO Bookshelf Should Have The position of Chief Information Security Officer (CISO) is relatively new and has just received recognition from the CxO community and board of directors at ...

Learn More
Jul 11, 2022
10 Best SIEM Tools, Products & Providers List

10 Best SIEM Tools, Products & Providers List SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve ...

Learn More
Jul 11, 2022
Dark Web Stories: Traditional Article Competition

Dark Web Stories: Traditional Article Competition One can find various sites inaccessible from the surface web on the dark web, including black markets, leak sites, hacker forums, and many more sites,...

Learn More
Jul 08, 2022
Major Cyber Attacks in Review: June 2022

Major Cyber Attacks in Review: June 2022 You can follow the major cyber security attacks of each month on SOCRadar’s “Radar” page! We experienced critical days last month due to...

Learn More
Jul 08, 2022
Checkmate Ransomware Targets QNAP SMB Services 

Checkmate Ransomware Targets QNAP SMB Services  New Checkmate ransomware has been discovered targeting QNAP NAS devices. Although the attacks are still being investigated, it is known that these new r...

Learn More
Jul 07, 2022
Under the Spotlight: RAMP Forum 

Under the Spotlight: RAMP Forum  In July 2021, a new Russian-speaking forum called RAMP, Russian Anonymous Market Place, which attracts a lot of interest from researchers and cybercriminals, was forme...

Learn More
Jul 07, 2022
Brute Ratel Utilized By Threat Actors In New Ransomware Operations

Brute Ratel Utilized By Threat Actors In New Ransomware Operations When Brute Ratel first appeared in the wild, almost no security solutions could detect it. To avoid being discovered by EDR and antiv...

Learn More
Jul 06, 2022
NPM Packages Used In A Supply Chain Attack 

NPM Packages Used In A Supply Chain Attack  Hundreds of desktop applications and websites were compromised by an NPM supply chain attack that started in December 2021, using malicious NPM packages wit...

Learn More
Jul 06, 2022
Top 5 Phishing Resources for SOC Teams

Top 5 Phishing Resources for SOC Teams Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to ...

Learn More
Jul 06, 2022
RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers

RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers RedAlert is a new ransomware operation aiming to encrypt Windows and Linux VMWare ESXi servers on corporate networks using the NTRUEnc...

Learn More