
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs? SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same t...

Critical Vulnerability in Zyxel Firewall and VPN Products Exploited
Critical Vulnerability in Zyxel Firewall and VPN Products Exploited Threat actors exploit the critical vulnerability affecting Zyxel’s firewall and VPN devices. The vulnerability allows attacker...

Common IoT Attacks that Compromise Security
Common IoT Attacks that Compromise Security With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wirel...

BPFdoor Malware Targets Linux Systems Unnoticed for Five Years
BPFdoor Malware Targets Linux Systems Unnoticed for Five Years It turned out that the backdoor malware called BPFdoor, which cybersecurity researchers recently discovered, has been targeting Linux and...

What is the RaidForums?
What is the RaidForums? RaidForums was launched in 2015 by Diogo Santos Coelho of Portugal, aka Omnipotent. Cybercriminals enormously used the RaidForums hacker site to obtain and sell stolen da...

What is the Risk-Based Approach to Cybersecurity?
What is the Risk-Based Approach to Cybersecurity? Cybersecurity is one of the main topics for business managers in today’s world. The approach to cyber risks has changed from “maturity bas...

10GB Database of Popular VPN Apps Leaked
10GB Database of Popular VPN Apps Leaked Threat actors shared a 10GB database allegedly belonging to popular VPN apps such as SuperVPN, GeckoVPN, and ChatVPN companies in a Telegram group. The databas...

Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabili...
Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabilities Fixed Microsoft has released the May 2022 Patch Tuesday. The patches fix three zero-day vulnerabilities, one of which is...

Critical Azure Vulnerability Creates a Massive Attack Surface
Critical Azure Vulnerability Creates a Massive Attack Surface Microsoft has released patches for a vulnerability that affects Azure Synapse and Azure Data Factory products, allowing threat actors to R...

The Week in Dark Web - 9 May 2022 - Access Sales and Data Leaks
The Week in Dark Web – 9 May 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some d...

What are the Top Ten Data Breaches of All Times?
What are the Top Ten Data Breaches of All Times? In the cyber world that grows and develops with cumulative data accumulation, “small” and short-term data breaches that we think we can ignore from tim...

Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Exec...
Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Execution A critical vulnerability discovered by F5 on May 4 allows threat actors to bypass iControl REST authentication. The flaw whi...

What are STIX/TAXII?
What are STIX/TAXII? The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII a...

Cyber Threats to NGOs Increase: Half of Organizations Targeted
Cyber Threats to NGOs Increase: Half of Organizations Targeted NGOs and humanitarian nonprofits depend on digital communication technologies and software to coordinate their missions worldwide. In par...

OSINT Framework Tools as Our Friends
OSINT Framework Tools as Our Friends ...

8 Ways to Prevent Supply Chain Attacks
8 Ways to Prevent Supply Chain Attacks Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others...

5 Tips for Social Media Security
5 Tips for Social Media Security Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and iden...

Real-Life Examples of Machine Learning in Cybersecurity
Real-Life Examples of Machine Learning in Cybersecurity ...

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity
Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and e...

Why do Companies Need Cybersecurity?
Why do Companies Need Cybersecurity? Cybersecurity encompasses all technologies and techniques that ensure the integrity of computer systems and electronic data. And, at an age where more and more of ...