
Critical Vulnerability in WSO2 Products Could Allow RCE
Critical Vulnerability in WSO2 Products Could Allow RCE It turned out that a critical vulnerability that affects the products of WSO2 and enables RCE has been actively exploited. WSO2 has a wide portf...

How to Prevent Steganography Attacks
How to Prevent Steganography Attacks Steganography is an antique soft craft concealing information in paintings or different art products. Most artists use this technique to hide their signatures and ...

The Week in Dark Web - 25 April 2022 - Access Sales and Data Leaks
The Week in Dark Web – 25 April 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, som...

Top 10 Cyber Security Awareness Days Worldwide
Top 10 Cyber Security Awareness Days Worldwide Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to...

T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code
T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code Telecommunications company T-Mobile confirmed that the Lapsus$ extortion group had accessed the company’s internal systems...

Atlassian Patches Jira Authentication Bypass Vulnerability
Atlassian Patches Jira Authentication Bypass Vulnerability Atlassian has released a security advisory announcing a critical authentication bypass vulnerability in Seraph, the company’s web frame...

Growing Attack Surfaces and Examples
Growing Attack Surfaces and Examples Your organization’s attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. ...

The Ultimate Guide to Brand Protection
The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...

Deep Web Profile: AgainstTheWest / BlueHornet [Part 2]
Deep Web Profile: AgainstTheWest / BlueHornet [Part 2] As explained in the first part, the famous leak group AgainstTheWest/BlueHornet decided to shut their operations after their unsuccessful private...

How to Use SOCRadar Integrations?
How to Use SOCRadar Integrations? SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platforms, Vulnerability Management, Ticketing, and Team Me...

What are the Different Types of Attacks in Cybersecurity?
What are the Different Types of Attacks in Cybersecurity? A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devi...

The Week in Dark Web - 18 April 2022 - Access Sales and Data Leaks
The Week in Dark Web – 18 April 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, som...

Comparing Benefits from Different Security Monitoring Services
Comparing Benefits from Different Security Monitoring Services By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U....

What Do You Need To Know About Cybersecurity in Power Grids
What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...

Deep Web Profile: AgainstTheWest / BlueHornet [Part 1]
Deep Web Profile: AgainstTheWest / BlueHornet [Part 1] In October 2021, a new leak group emerged in RaidForums with the handle AgainstTheWest. They have started actively targeting major organizations ...

Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue
Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity ...

‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market?...
‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market? It’s easy to appreciate the importance hackers place on stolen bank accounts, credit cards, and social security numbers. Each of t...

IBM X-Force: Now Threat Actors are Faster and Hard to Detect
IBM X-Force: Now Threat Actors are Faster and Hard to Detect Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have chan...

Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulner...
Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities....

Is Nginx Zero-Day RCE Vulnerability False Alarm?
Is Nginx Zero-Day RCE Vulnerability False Alarm? On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twit...