
Hundreds of Windows Networks are Infected with Raspberry Robin Worm
Hundreds of Windows Networks are Infected with Raspberry Robin Worm [Update] February 12, 2024: “Raspberry Robin Malware Advances with New One-Day Exploits” Microsoft reported that hundred...

SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted ...
SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted Every 9 Days Cybercrime is a threat that closely concerns public authorities, companies, and residents in Denmark, as it is around...

SOCRadar Singapore Threat Landscape Report: Excessive Increase in Cybe...
SOCRadar Singapore Threat Landscape Report: Excessive Increase in Cyberattack Attempts The cyber security agenda is shaken every day with brand-new threats and methods developed by malicious actors. W...

New Version of Raccoon Stealer Released
New Version of Raccoon Stealer Released The new version of Raccoon Stealer has been released. The first version was first seen in 2019 and served as MaaS (malware-as-a-service.) The malware ceased ope...

What is Network Performance Monitoring (NPM)?
What is Network Performance Monitoring (NPM)? Network Performance Monitoring (NPM) is assessing the service quality of a network as experienced by users by measuring, visualizing, monitoring, diagnosi...

New Banking Trojan Revive Targets BBVA Customers
New Banking Trojan Revive Targets BBVA Customers The newly emerged Android banking trojan Revive mimics BBVA bank’s two-factor authentication app. Although still in early development, the m...

Malicious Python Packages Steal AWS Keys
Malicious Python Packages Steal AWS Keys Cybersecurity researchers have discovered that some Python packages available in the PyPI repositories engage in malicious activity. Malicious packets send som...

Threat Actors Target VMware Servers by Exploiting Log4Shell Vulnerabil...
Threat Actors Target VMware Servers by Exploiting Log4Shell Vulnerability The Log4Shell RCE vulnerability with code CVE-2021-44228 continues to be exploited by state-backed threat actors. Attackers ut...

How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye?
How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye? Have you ever wondered how hackers find the IPs, ports, and services required for their attacks? Some attacks need thousands of host co...

Dark Web Profile: Netwalker Ransomware
Dark Web Profile: Netwalker Ransomware Today, with the effects of digitalization, most of the information is stored online. This situation creates a vulnerability for organizations because the number ...

NTLM Relay Attack Leads to Windows Domain Takeover
NTLM Relay Attack Leads to Windows Domain Takeover A new DFSCoerce NTLM Relay attack has been discovered on Windows. Threat actors can take over Microsoft Active Directory Certificate Services (AD CS)...

SOCRadar Exhibiting Extended Threat Intelligence Solution at InfoSecur...
SOCRadar Exhibiting Extended Threat Intelligence Solution at InfoSecurity Europe 2022 SOCRadar will be at InfoSecurity Europe, held at London ExCel this week from 21 to 23 June. We are very excited to...

BRATA Malware Becomes an Advanced Threat
BRATA Malware Becomes an Advanced Threat Originally a banking trojan, BRATA acquires new capabilities and becomes a more advanced threat. Malware can now be much more effective at stealing user i...

DriftingCloud APT Group Exploits Zero-Day In Sophos Firewall
DriftingCloud APT Group Exploits Zero-Day In Sophos Firewall Cybersecurity researchers have revealed that Sophos Firewall has been actively exploited by DriftingCloud APT group since early March. Appa...

Cisco Fixed Critical Authentication Bypass Vulnerability Affecting Som...
Cisco Fixed Critical Authentication Bypass Vulnerability Affecting Some Products Cisco fixed a vulnerability discovered in the external authentication functionality of Secure Email and Web Manager. Th...

Microsoft June 2022 Patch Tuesday Fixes 55 Vulnerabilities Including F...
Microsoft June 2022 Patch Tuesday Fixes 55 Vulnerabilities Including Follina Microsoft has released the June 2022 Patch Tuesday. The company announced that it had patched 55 vulnerabilities, including...

Almost Impossible to Detect Symbiote Linux Malware
Almost Impossible to Detect Symbiote Linux Malware The newly discovered Linux malware Symbiote can easily infect and hide in almost any process on compromised systems. The malware steals account ...

What Do You Need to Know About New SAMA Principles?
What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...

Ransomware Groups Target VMware and QNAP Products
Ransomware Groups Target VMware and QNAP Products Linux-based Black Basta ransomware targets VMware ESXi virtual machines, while DeadBolt ransomware targets QNAP NAS (network-attached storage) product...

Top 10 Cybersecurity Events You Must Follow
Top 10 Cybersecurity Events You Must Follow Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with ...