Apr 11, 2022
Android Banking Malware Octo Allows Remote Control on Infected Devices

Android Banking Malware Octo Allows Remote Control on Infected Devices A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions....

Learn More
Apr 08, 2022
20 SOCRadar Notifications That Will Make You Feel Safer

20 SOCRadar Notifications That Will Make You Feel Safer SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In additio...

Learn More
Apr 07, 2022
Most Remarkable APT Incidents That Targeted Malaysia in 2021

Most Remarkable APT Incidents That Targeted Malaysia in 2021 Malaysia has rapidly integrated into the digital age with the rest of the world for the past few decades because of the exponential develop...

Learn More
Apr 07, 2022
Most Remarkable APT Incidents That Targeted Netherlands in 2021

Most Remarkable APT Incidents That Targeted Netherlands in 2021 The Netherlands is regarded as the technological gateway to Europe. The internet economy in the Netherlands, which currently accounts fo...

Learn More
Apr 06, 2022
What are the Biggest Cybersecurity Risks in North America?

What are the Biggest Cybersecurity Risks in North America? The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of...

Learn More
Apr 06, 2022
Danger Lurking in GitHub Repositories

Danger Lurking in GitHub Repositories GitHub is a system that has become the world’s largest source code repository, used by %90 of Fortune 100 companies and 94 million developers for sever...

Learn More
Apr 04, 2022
Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server Cyberattack Timeline Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control ...

Learn More
Apr 04, 2022
New Remote Access Trojan (RAT) named Borat on the Darknet Markets

New Remote Access Trojan (RAT) named Borat on the Darknet Markets Threat actors are developing more advanced attack techniques every day. They even help non-technical attackers by publishing toolkits....

Learn More
Apr 01, 2022
5 Things You Should Know About the Genesis Marketplace

5 Things You Should Know About the Genesis Marketplace [April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genes...

Learn More
Apr 01, 2022
What Do You Need to Know About Spring4Shell Zero-Day Vulnerability?

What Do You Need to Know About Spring4Shell Zero-Day Vulnerability? A zero-day vulnerability that affects the Spring Core Java framework called Spring4Shell and allows RCE has been disclosed.&nbs...

Learn More
Mar 31, 2022
What Cyber Security Experts Think: How to Make Money on the Dark Web?

What Cyber Security Experts Think: How to Make Money on the Dark Web? People increasingly purchase and sell items in the Internet’s most obscure corners. Amazon, Shopify, Walmart, and eBay are all wel...

Learn More
Mar 31, 2022
Dark Web Profile: Lapsus$ Extortion Group

Dark Web Profile: Lapsus$ Extortion Group [Update] August 11, 2023: The Cyber Safety Review Board (CSRB) published a review of the Lapsus$ extortion group’s attacks. Read more under: “A Review of Laps...

Learn More
Mar 30, 2022
What's the Difference Between Dark Web, Deep Web and Dark Net?

What’s the Difference Between Dark Web, Deep Web and Dark Net? When people discuss the shady underbelly of the internet, stolen data, drugs, weapons, child pornography, rent killings, illegal it...

Learn More
Mar 30, 2022
CISOs Guide to External Attack Surface Management (EASM)

CISOs Guide to External Attack Surface Management (EASM) The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomwar...

Learn More
Mar 30, 2022
What is Red Teaming and How Does It Work?

What is Red Teaming and How Does It Work? Red Teaming is a multi-layered attack simulation that assesses how well a company’s people, networks, applications, and physical security controls can survive...

Learn More
Mar 30, 2022
Is Lapsus$ Extortion Group "Officially Back from Vacation"?

Is Lapsus$ Extortion Group “Officially Back from Vacation”? The Lapsus$ group announced that they would be on vacation until March 30 after the notorious Okta attack. In the early hours of...

Learn More
Mar 29, 2022
SOCRadar UAE Threat Landscape Report: Runner-up for the Top 10 Targete...

SOCRadar UAE Threat Landscape Report: Runner-up for the Top 10 Targeted Countries SOCRadar’s Threat Landscape Report provides a broad perspective on cyber incidents across various countries...

Learn More
Mar 28, 2022
The Week in Dark Web - 28 March 2022 - Access Sales and Data Leaks

The Week in Dark Web – 28 March 2022 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware ...

Learn More
Mar 28, 2022
Anonymous Threatened Western Companies Operating in Russia Raises Conc...

Anonymous Threatened Western Companies Operating in Russia Raises Concerns of Cyber Attack Global hacktivist group Anonymous has threatened a list of companies that continue to operate in Russia,...

Learn More
Mar 28, 2022
What is Extended Threat Intelligence (XTI) and How Does it Make a Diff...

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference? Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intell...

Learn More