Free Trial
Dark Web Report
Jun 22, 2022
How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye? 

How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye?  Have you ever wondered how hackers find the IPs, ports, and services required for their attacks? Some attacks need thousands of host co...

Learn More
Jun 22, 2022
Dark Web Profile: Netwalker Ransomware

Dark Web Profile: Netwalker Ransomware Today, with the effects of digitalization, most of the information is stored online. This situation creates a vulnerability for organizations because the number ...

Learn More
Jun 21, 2022
NTLM Relay Attack Leads to Windows Domain Takeover

NTLM Relay Attack Leads to Windows Domain Takeover A new DFSCoerce NTLM Relay attack has been discovered on Windows. Threat actors can take over Microsoft Active Directory Certificate Services (AD CS)...

Learn More
Jun 20, 2022
SOCRadar Exhibiting Extended Threat Intelligence Solution at InfoSecur...

SOCRadar Exhibiting Extended Threat Intelligence Solution at InfoSecurity Europe 2022 SOCRadar will be at InfoSecurity Europe, held at London ExCel this week from 21 to 23 June. We are very excited to...

Learn More
Jun 20, 2022
BRATA Malware Becomes an Advanced Threat

BRATA Malware Becomes an Advanced Threat Originally a banking trojan, BRATA acquires new capabilities and becomes a more advanced threat. Malware can now be much more effective at stealing user i...

Learn More
Jun 17, 2022
DriftingCloud APT Group Exploits Zero-Day In Sophos Firewall

DriftingCloud APT Group Exploits Zero-Day In Sophos Firewall Cybersecurity researchers have revealed that Sophos Firewall has been actively exploited by DriftingCloud APT group since early March. Appa...

Learn More
Jun 16, 2022
Cisco Fixed Critical Authentication Bypass Vulnerability Affecting Som...

Cisco Fixed Critical Authentication Bypass Vulnerability Affecting Some Products Cisco fixed a vulnerability discovered in the external authentication functionality of Secure Email and Web Manager. Th...

Learn More
Jun 15, 2022
Microsoft June 2022 Patch Tuesday Fixes 55 Vulnerabilities Including F...

Microsoft June 2022 Patch Tuesday Fixes 55 Vulnerabilities Including Follina Microsoft has released the June 2022 Patch Tuesday. The company announced that it had patched 55 vulnerabilities, including...

Learn More
Jun 10, 2022
Almost Impossible to Detect Symbiote Linux Malware

Almost Impossible to Detect Symbiote Linux Malware The newly discovered Linux malware Symbiote can easily infect and hide in almost any process on compromised systems. The malware steals account ...

Learn More
Jun 08, 2022
What Do You Need to Know About New SAMA Principles?

What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...

Learn More
Jun 08, 2022
Ransomware Groups Target VMware and QNAP Products

Ransomware Groups Target VMware and QNAP Products Linux-based Black Basta ransomware targets VMware ESXi virtual machines, while DeadBolt ransomware targets QNAP NAS (network-attached storage) product...

Learn More
Jun 07, 2022
Top 10 Cybersecurity Events You Must Follow

Top 10 Cybersecurity Events You Must Follow Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with ...

Learn More
Jun 07, 2022
Mandiant Leak Alleged: A PR Trial? 

Mandiant Leak Alleged: A PR Trial?  LockBit ransomware gang claimed that they had stolen Mandiant’s data. The gang posted a countdown on their data leak site earlier today. They c...

Learn More
Jun 06, 2022
What Do You Need To Know About Atlassian Confluence RCE Vulnerability?...

What Do You Need To Know About Atlassian Confluence RCE Vulnerability?  After it was disclosed that the RCE vulnerability with the code CVE-2022-26134, which affects Atlassian Confluence and Data Cent...

Learn More
Jun 02, 2022
What are Threat Hunting Tools?

What are Threat Hunting Tools? Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunt...

Learn More
Jun 01, 2022
Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breach...

Learn More
Jun 01, 2022
On-Device Fraud Trend in Mobile Malware Campaigns

On-Device Fraud Trend in Mobile Malware Campaigns According to the 2022 mobile threat landscape analysis published byThreatFabric, ODF (on-device fraud) banking trojans targeting A...

Learn More
May 31, 2022
Workarounds for Microsoft Office Zero-Day RCE Vulnerability "Follina" ...

Workarounds for Microsoft Office Zero-Day RCE Vulnerability “Follina” has Released The Follina zero-day vulnerability in Microsoft Office allows threat actors to perform remote code e...

Learn More
May 30, 2022
GitHub Announces 100,000 npm Users' Credentials Stolen

GitHub Announces 100,000 npm Users’ Credentials Stolen GitHub has announced that 100,000 npm user information was stolen through OAuth tokens linked to Heroku and Travis CI. It was previously&nb...

Learn More
May 27, 2022
Deep Web Profile: REvil

Deep Web Profile: REvil REvil is a ransomware hacking group, as its name suggests -REvil = “ransomware” + “evil”-. This ransomware group is thought to be centered in Russia. It is also named “Sodinoki...

Learn More