Mar 25, 2022
How to Identify Spear Phishing?

How to Identify Spear Phishing? Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with...

Learn More
Mar 25, 2022
Automotive Industry Under Ransomware Attacks

Automotive Industry Under Ransomware Attacks Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. Accord...

Learn More
Mar 24, 2022
Telegram: A New Place for Hackers

Telegram: A New Place for Hackers One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp a...

Learn More
Mar 23, 2022
Let’s Start from the Beginning: What is Cybersecurity in 2022?

Let’s Start from the Beginning: What is Cybersecurity in 2022? The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as...

Learn More
Mar 22, 2022
Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak The Lapsus$ group has announced that they are responsible for authentication service provider Okta’s digital breach. Threat...

Learn More
Mar 21, 2022
The Week in Dark Web - 21 March 2022 - Ransomware Attacks and Data Lea...

The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ranso...

Learn More
Mar 21, 2022
Dark Web Profile: AvosLocker Ransomware

Dark Web Profile: AvosLocker Ransomware AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, str...

Learn More
Mar 21, 2022
How Can Reinforce Your Brand Protection Against Cyber Threats?

How Can Reinforce Your Brand Protection Against Cyber Threats? The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must...

Learn More
Mar 18, 2022
SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for ...

SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for Threat Actors Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for th...

Learn More
Mar 18, 2022
An Overview on Conti Ransomware Leaks: Is This the End for Conti?

An Overview on Conti Ransomware Leaks: Is This the End for Conti? Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There...

Learn More
Mar 17, 2022
What Do You Need To Know About Vulnerability Intelligence

What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...

Learn More
Mar 16, 2022
B1txor20 Malware Exploiting Log4J Vulnerability

B1txor20 Malware Exploiting Log4J Vulnerability Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in ...

Learn More
Mar 15, 2022
Deep Web Profile: APT41/Double Dragon

Deep Web Profile: APT41/Double Dragon APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operati...

Learn More
Mar 15, 2022
Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication

Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code...

Learn More
Mar 14, 2022
The Week in Dark Web - 14 March 2022 - Ransomware Attacks and Data Lea...

The Week in Dark Web – 14 March 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ranso...

Learn More
Mar 11, 2022
What Should We Learn From the Conti's HSE Ireland Attack?

What Should We Learn From the Conti’s HSE Ireland Attack? Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even targ...

Learn More
Mar 10, 2022
ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27002 and Threat Intelligence: The New Security Standard ...

Learn More
Mar 10, 2022
Dark Web Profile: Who is 'Stormous Ransomware' Claiming to Leak Epic G...

Dark Web Profile: Who is ‘Stormous Ransomware’ Claiming to Leak Epic Games Information [Update] July 28, 2023: The Stormous ransomware gang has recently made a comeback. Added the subheading: “Stormou...

Learn More
Mar 09, 2022
Step by Step Threat Hunting

Step by Step Threat Hunting Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out...

Learn More
Mar 08, 2022
How to Prevent Credential Stuffing Attacks?

How to Prevent Credential Stuffing Attacks? We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Si...

Learn More