Jun 08, 2022
What Do You Need to Know About New SAMA Principles?

What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...

Learn More
Jun 08, 2022
Ransomware Groups Target VMware and QNAP Products

Ransomware Groups Target VMware and QNAP Products Linux-based Black Basta ransomware targets VMware ESXi virtual machines, while DeadBolt ransomware targets QNAP NAS (network-attached storage) product...

Learn More
Jun 07, 2022
Top 10 Cybersecurity Events You Must Follow

Top 10 Cybersecurity Events You Must Follow Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with ...

Learn More
Jun 07, 2022
Mandiant Leak Alleged: A PR Trial? 

Mandiant Leak Alleged: A PR Trial?  LockBit ransomware gang claimed that they had stolen Mandiant’s data. The gang posted a countdown on their data leak site earlier today. They c...

Learn More
Jun 06, 2022
What Do You Need To Know About Atlassian Confluence RCE Vulnerability?...

What Do You Need To Know About Atlassian Confluence RCE Vulnerability?  After it was disclosed that the RCE vulnerability with the code CVE-2022-26134, which affects Atlassian Confluence and Data Cent...

Learn More
Jun 02, 2022
What are Threat Hunting Tools?

What are Threat Hunting Tools? Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunt...

Learn More
Jun 01, 2022
Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breach...

Learn More
Jun 01, 2022
On-Device Fraud Trend in Mobile Malware Campaigns

On-Device Fraud Trend in Mobile Malware Campaigns According to the 2022 mobile threat landscape analysis published byThreatFabric, ODF (on-device fraud) banking trojans targeting A...

Learn More
May 31, 2022
Workarounds for Microsoft Office Zero-Day RCE Vulnerability "Follina" ...

Workarounds for Microsoft Office Zero-Day RCE Vulnerability “Follina” has Released The Follina zero-day vulnerability in Microsoft Office allows threat actors to perform remote code e...

Learn More
May 30, 2022
GitHub Announces 100,000 npm Users' Credentials Stolen

GitHub Announces 100,000 npm Users’ Credentials Stolen GitHub has announced that 100,000 npm user information was stolen through OAuth tokens linked to Heroku and Travis CI. It was previously&nb...

Learn More
May 27, 2022
Deep Web Profile: REvil

Deep Web Profile: REvil REvil is a ransomware hacking group, as its name suggests -REvil = “ransomware” + “evil”-. This ransomware group is thought to be centered in Russia. It is also named “Sodinoki...

Learn More
May 27, 2022
PoC Released for Authentication Bypass Vulnerability in VMware

PoC Released for Authentication Bypass Vulnerability in VMware Vulnerability-related PoC has been published that allows threat actors to bypass authentication across multiple VMware products. VMw...

Learn More
May 26, 2022
20 Interesting Facts About Ransomware

20 Interesting Facts About Ransomware Ransomware attacks marked 2021 and continue to make a splash in 2022. We’ve compiled some interesting information about this type of attack that has frightened fi...

Learn More
May 25, 2022
How DNS Sinkholing Works?

How DNS Sinkholing Works? ...

Learn More
May 25, 2022
Stop BEC Attacks with SOCRadar Takedown Processes

Stop BEC Attacks with SOCRadar Takedown Processes Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious t...

Learn More
May 24, 2022
What Do You Need To Know and Do About Compromised CTX Module in Python...

What Do You Need To Know and Do About Compromised CTX Module in Python Package Repositories? According to a post on Reddit, evidence was presented that the CTX module in the Python package repositorie...

Learn More
May 24, 2022
Turla Reconnaissance Campaign Targets Eastern Europe

Turla Reconnaissance Campaign Targets Eastern Europe The reconnaissance and espionage campaign of the Russia-linked Turla hacker group against the Austrian Economic Chamber, Baltic Defense College, an...

Learn More
May 20, 2022
Deep Web Profile: Karakurt Extortion Group

Deep Web Profile: Karakurt Extortion Group Karakurt has extorted sensitive data from nearly 40 different organizations within a year, a Russian-originated cybercriminal organization. So what is the ca...

Learn More
May 20, 2022
Conti Ransomware Ended: They Operate With Other Groups Now

Conti Ransomware Ended: They Operate With Other Groups Now The Conti ransomware gang had taken its infrastructure offline and ceased operations. According to the news of Advanced Intel’s Yelisey...

Learn More
May 19, 2022
Attack Surface Management (ASM) in 10 Questions

Attack Surface Management (ASM) in 10 Questions The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface ...

Learn More