
How to Identify Spear Phishing?
How to Identify Spear Phishing? Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with...

Automotive Industry Under Ransomware Attacks
Automotive Industry Under Ransomware Attacks Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. Accord...

Telegram: A New Place for Hackers
Telegram: A New Place for Hackers One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp a...

Let’s Start from the Beginning: What is Cybersecurity in 2022?
Let’s Start from the Beginning: What is Cybersecurity in 2022? The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as...

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak
Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak The Lapsus$ group has announced that they are responsible for authentication service provider Okta’s digital breach. Threat...

The Week in Dark Web - 21 March 2022 - Ransomware Attacks and Data Lea...
The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ranso...

Dark Web Profile: AvosLocker Ransomware
Dark Web Profile: AvosLocker Ransomware AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, str...

How Can Reinforce Your Brand Protection Against Cyber Threats?
How Can Reinforce Your Brand Protection Against Cyber Threats? The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must...

SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for ...
SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for Threat Actors Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for th...

An Overview on Conti Ransomware Leaks: Is This the End for Conti?
An Overview on Conti Ransomware Leaks: Is This the End for Conti? Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There...

What Do You Need To Know About Vulnerability Intelligence
What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...

B1txor20 Malware Exploiting Log4J Vulnerability
B1txor20 Malware Exploiting Log4J Vulnerability Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in ...

Deep Web Profile: APT41/Double Dragon
Deep Web Profile: APT41/Double Dragon APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operati...

Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication
Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code...

The Week in Dark Web - 14 March 2022 - Ransomware Attacks and Data Lea...
The Week in Dark Web – 14 March 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ranso...

What Should We Learn From the Conti's HSE Ireland Attack?
What Should We Learn From the Conti’s HSE Ireland Attack? Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even targ...

ISO 27002 and Threat Intelligence: The New Security Standard
ISO 27002 and Threat Intelligence: The New Security Standard ...

Dark Web Profile: Who is 'Stormous Ransomware' Claiming to Leak Epic G...
Dark Web Profile: Who is ‘Stormous Ransomware’ Claiming to Leak Epic Games Information [Update] July 28, 2023: The Stormous ransomware gang has recently made a comeback. Added the subheading: “Stormou...

Step by Step Threat Hunting
Step by Step Threat Hunting Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out...

How to Prevent Credential Stuffing Attacks?
How to Prevent Credential Stuffing Attacks? We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Si...