May 16, 2022
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs? SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same t...

Learn More
May 16, 2022
Critical Vulnerability in Zyxel Firewall and VPN Products Exploited

Critical Vulnerability in Zyxel Firewall and VPN Products Exploited Threat actors exploit the critical vulnerability affecting Zyxel’s firewall and VPN devices. The vulnerability allows attacker...

Learn More
May 13, 2022
Common IoT Attacks that Compromise Security

Common IoT Attacks that Compromise Security With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wirel...

Learn More
May 13, 2022
BPFdoor Malware Targets Linux Systems Unnoticed for Five Years

BPFdoor Malware Targets Linux Systems Unnoticed for Five Years It turned out that the backdoor malware called BPFdoor, which cybersecurity researchers recently discovered, has been targeting Linux and...

Learn More
May 13, 2022
What is the RaidForums?

What is the RaidForums? RaidForums was launched in 2015 by Diogo Santos Coelho of Portugal, aka Omnipotent.  Cybercriminals enormously used the RaidForums hacker site to obtain and sell stolen da...

Learn More
May 12, 2022
What is the Risk-Based Approach to Cybersecurity?

What is the Risk-Based Approach to Cybersecurity? Cybersecurity is one of the main topics for business managers in today’s world. The approach to cyber risks has changed from “maturity bas...

Learn More
May 12, 2022
10GB Database of Popular VPN Apps Leaked

10GB Database of Popular VPN Apps Leaked Threat actors shared a 10GB database allegedly belonging to popular VPN apps such as SuperVPN, GeckoVPN, and ChatVPN companies in a Telegram group. The databas...

Learn More
May 11, 2022
Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabili...

Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabilities Fixed Microsoft has released the May 2022 Patch Tuesday. The patches fix three zero-day vulnerabilities, one of which is...

Learn More
May 10, 2022
Critical Azure Vulnerability Creates a Massive Attack Surface

Critical Azure Vulnerability Creates a Massive Attack Surface Microsoft has released patches for a vulnerability that affects Azure Synapse and Azure Data Factory products, allowing threat actors to R...

Learn More
May 09, 2022
The Week in Dark Web - 9 May 2022 - Access Sales and Data Leaks

The Week in Dark Web – 9 May 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some d...

Learn More
May 06, 2022
What are the Top Ten Data Breaches of All Times?

What are the Top Ten Data Breaches of All Times? In the cyber world that grows and develops with cumulative data accumulation, “small” and short-term data breaches that we think we can ignore from tim...

Learn More
May 05, 2022
Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Exec...

Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Execution A critical vulnerability discovered by F5 on May 4 allows threat actors to bypass iControl REST authentication. The flaw whi...

Learn More
May 04, 2022
What are STIX/TAXII?

What are STIX/TAXII? The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII a...

Learn More
May 04, 2022
Cyber Threats to NGOs Increase: Half of Organizations Targeted

Cyber Threats to NGOs Increase: Half of Organizations Targeted NGOs and humanitarian nonprofits depend on digital communication technologies and software to coordinate their missions worldwide. In par...

Learn More
May 03, 2022
OSINT Framework Tools as Our Friends

OSINT Framework Tools as Our Friends ...

Learn More
May 03, 2022
8 Ways to Prevent Supply Chain Attacks

8 Ways to Prevent Supply Chain Attacks Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others...

Learn More
May 02, 2022
5 Tips for Social Media Security

5 Tips for Social Media Security Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and iden...

Learn More
May 02, 2022
Real-Life Examples of Machine Learning in Cybersecurity

Real-Life Examples of Machine Learning in Cybersecurity ...

Learn More
Apr 28, 2022
Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and e...

Learn More
Apr 27, 2022
Why do Companies Need Cybersecurity?

Why do Companies Need Cybersecurity? Cybersecurity encompasses all technologies and techniques that ensure the integrity of computer systems and electronic data. And, at an age where more and more of ...

Learn More