Apr 27, 2022
Critical Vulnerability in WSO2 Products Could Allow RCE

Critical Vulnerability in WSO2 Products Could Allow RCE It turned out that a critical vulnerability that affects the products of WSO2 and enables RCE has been actively exploited. WSO2 has a wide portf...

Learn More
Apr 26, 2022
How to Prevent Steganography Attacks

How to Prevent Steganography Attacks Steganography is an antique soft craft concealing information in paintings or different art products. Most artists use this technique to hide their signatures and ...

Learn More
Apr 25, 2022
The Week in Dark Web - 25 April 2022 - Access Sales and Data Leaks

The Week in Dark Web – 25 April 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, som...

Learn More
Apr 25, 2022
Top 10 Cyber Security Awareness Days Worldwide

Top 10 Cyber Security Awareness Days Worldwide Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to...

Learn More
Apr 25, 2022
T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code

T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code Telecommunications company T-Mobile confirmed that the Lapsus$ extortion group had accessed the company’s internal systems...

Learn More
Apr 23, 2022
Atlassian Patches Jira Authentication Bypass Vulnerability

Atlassian Patches Jira Authentication Bypass Vulnerability Atlassian has released a security advisory announcing a critical authentication bypass vulnerability in Seraph, the company’s web frame...

Learn More
Apr 21, 2022
Growing Attack Surfaces and Examples 

Growing Attack Surfaces and Examples  Your organization’s attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. ...

Learn More
Apr 20, 2022
The Ultimate Guide to Brand Protection

The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...

Learn More
Apr 20, 2022
Deep Web Profile: AgainstTheWest / BlueHornet [Part 2]

Deep Web Profile: AgainstTheWest / BlueHornet [Part 2] As explained in the first part, the famous leak group AgainstTheWest/BlueHornet decided to shut their operations after their unsuccessful private...

Learn More
Apr 19, 2022
How to Use SOCRadar Integrations?

How to Use SOCRadar Integrations? SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platforms, Vulnerability Management, Ticketing, and Team Me...

Learn More
Apr 18, 2022
What are the Different Types of Attacks in Cybersecurity?

What are the Different Types of Attacks in Cybersecurity? A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devi...

Learn More
Apr 18, 2022
The Week in Dark Web - 18 April 2022 - Access Sales and Data Leaks

The Week in Dark Web – 18 April 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, som...

Learn More
Apr 18, 2022
Comparing Benefits from Different Security Monitoring Services

Comparing Benefits from Different Security Monitoring Services By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U....

Learn More
Apr 15, 2022
What Do You Need To Know About Cybersecurity in Power Grids

What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...

Learn More
Apr 15, 2022
Deep Web Profile: AgainstTheWest / BlueHornet [Part 1]

Deep Web Profile: AgainstTheWest / BlueHornet [Part 1] In October 2021, a new leak group emerged in RaidForums with the handle AgainstTheWest. They have started actively targeting major organizations ...

Learn More
Apr 15, 2022
Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue

Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity ...

Learn More
Apr 14, 2022
‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market?...

‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market? It’s easy to appreciate the importance hackers place on stolen bank accounts, credit cards, and social security numbers. Each of t...

Learn More
Apr 13, 2022
IBM X-Force: Now Threat Actors are Faster and Hard to Detect

IBM X-Force: Now Threat Actors are Faster and Hard to Detect Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have chan...

Learn More
Apr 13, 2022
Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulner...

Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities....

Learn More
Apr 12, 2022
Is Nginx Zero-Day RCE Vulnerability False Alarm?

Is Nginx Zero-Day RCE Vulnerability False Alarm? On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twit...

Learn More