Jul 04, 2022
Hundreds of Windows Networks are Infected with Raspberry Robin Worm

Hundreds of Windows Networks are Infected with Raspberry Robin Worm [Update] February 12, 2024: “Raspberry Robin Malware Advances with New One-Day Exploits” Microsoft reported that hundred...

Learn More
Jul 04, 2022
SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted ...

SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted Every 9 Days Cybercrime is a threat that closely concerns public authorities, companies, and residents in Denmark, as it is around...

Learn More
Jun 29, 2022
SOCRadar Singapore Threat Landscape Report: Excessive Increase in Cybe...

SOCRadar Singapore Threat Landscape Report: Excessive Increase in Cyberattack Attempts The cyber security agenda is shaken every day with brand-new threats and methods developed by malicious actors. W...

Learn More
Jun 29, 2022
New Version of Raccoon Stealer Released

New Version of Raccoon Stealer Released The new version of Raccoon Stealer has been released. The first version was first seen in 2019 and served as MaaS (malware-as-a-service.) The malware ceased ope...

Learn More
Jun 28, 2022
What is Network Performance Monitoring (NPM)?

What is Network Performance Monitoring (NPM)? Network Performance Monitoring (NPM) is assessing the service quality of a network as experienced by users by measuring, visualizing, monitoring, diagnosi...

Learn More
Jun 28, 2022
New Banking Trojan Revive Targets BBVA Customers

New Banking Trojan Revive Targets BBVA Customers The newly emerged Android banking trojan Revive mimics BBVA bank’s two-factor authentication app. Although still in early development, the m...

Learn More
Jun 27, 2022
Malicious Python Packages Steal AWS Keys

Malicious Python Packages Steal AWS Keys Cybersecurity researchers have discovered that some Python packages available in the PyPI repositories engage in malicious activity. Malicious packets send som...

Learn More
Jun 24, 2022
Threat Actors Target VMware Servers by Exploiting Log4Shell Vulnerabil...

Threat Actors Target VMware Servers by Exploiting Log4Shell Vulnerability The Log4Shell RCE vulnerability with code CVE-2021-44228 continues to be exploited by state-backed threat actors. Attackers ut...

Learn More
Jun 22, 2022
How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye? 

How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye?  Have you ever wondered how hackers find the IPs, ports, and services required for their attacks? Some attacks need thousands of host co...

Learn More
Jun 22, 2022
Dark Web Profile: Netwalker Ransomware

Dark Web Profile: Netwalker Ransomware Today, with the effects of digitalization, most of the information is stored online. This situation creates a vulnerability for organizations because the number ...

Learn More
Jun 21, 2022
NTLM Relay Attack Leads to Windows Domain Takeover

NTLM Relay Attack Leads to Windows Domain Takeover A new DFSCoerce NTLM Relay attack has been discovered on Windows. Threat actors can take over Microsoft Active Directory Certificate Services (AD CS)...

Learn More
Jun 20, 2022
SOCRadar Exhibiting Extended Threat Intelligence Solution at InfoSecur...

SOCRadar Exhibiting Extended Threat Intelligence Solution at InfoSecurity Europe 2022 SOCRadar will be at InfoSecurity Europe, held at London ExCel this week from 21 to 23 June. We are very excited to...

Learn More
Jun 20, 2022
BRATA Malware Becomes an Advanced Threat

BRATA Malware Becomes an Advanced Threat Originally a banking trojan, BRATA acquires new capabilities and becomes a more advanced threat. Malware can now be much more effective at stealing user i...

Learn More
Jun 17, 2022
DriftingCloud APT Group Exploits Zero-Day In Sophos Firewall

DriftingCloud APT Group Exploits Zero-Day In Sophos Firewall Cybersecurity researchers have revealed that Sophos Firewall has been actively exploited by DriftingCloud APT group since early March. Appa...

Learn More
Jun 16, 2022
Cisco Fixed Critical Authentication Bypass Vulnerability Affecting Som...

Cisco Fixed Critical Authentication Bypass Vulnerability Affecting Some Products Cisco fixed a vulnerability discovered in the external authentication functionality of Secure Email and Web Manager. Th...

Learn More
Jun 15, 2022
Microsoft June 2022 Patch Tuesday Fixes 55 Vulnerabilities Including F...

Microsoft June 2022 Patch Tuesday Fixes 55 Vulnerabilities Including Follina Microsoft has released the June 2022 Patch Tuesday. The company announced that it had patched 55 vulnerabilities, including...

Learn More
Jun 10, 2022
Almost Impossible to Detect Symbiote Linux Malware

Almost Impossible to Detect Symbiote Linux Malware The newly discovered Linux malware Symbiote can easily infect and hide in almost any process on compromised systems. The malware steals account ...

Learn More
Jun 08, 2022
What Do You Need to Know About New SAMA Principles?

What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...

Learn More
Jun 08, 2022
Ransomware Groups Target VMware and QNAP Products

Ransomware Groups Target VMware and QNAP Products Linux-based Black Basta ransomware targets VMware ESXi virtual machines, while DeadBolt ransomware targets QNAP NAS (network-attached storage) product...

Learn More
Jun 07, 2022
Top 10 Cybersecurity Events You Must Follow

Top 10 Cybersecurity Events You Must Follow Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with ...

Learn More