Top 10 Cyber Security Awareness Days Worldwide
Top 10 Cyber Security Awareness Days Worldwide Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to...
T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code
T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code Telecommunications company T-Mobile confirmed that the Lapsus$ extortion group had accessed the company’s internal systems...
Atlassian Patches Jira Authentication Bypass Vulnerability
Atlassian Patches Jira Authentication Bypass Vulnerability Atlassian has released a security advisory announcing a critical authentication bypass vulnerability in Seraph, the company’s web frame...
Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue
Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity ...
IBM X-Force: Now Threat Actors are Faster and Hard to Detect
IBM X-Force: Now Threat Actors are Faster and Hard to Detect Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have chan...
Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulner...
Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities....
Is Nginx Zero-Day RCE Vulnerability False Alarm?
Is Nginx Zero-Day RCE Vulnerability False Alarm? On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twit...
Android Banking Malware Octo Allows Remote Control on Infected Devices
Android Banking Malware Octo Allows Remote Control on Infected Devices A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions....
Most Remarkable APT Incidents That Targeted Malaysia in 2021
Most Remarkable APT Incidents That Targeted Malaysia in 2021 Malaysia has rapidly integrated into the digital age with the rest of the world for the past few decades because of the exponential develop...
Most Remarkable APT Incidents That Targeted Netherlands in 2021
Most Remarkable APT Incidents That Targeted Netherlands in 2021 The Netherlands is regarded as the technological gateway to Europe. The internet economy in the Netherlands, which currently accounts fo...
What are the Biggest Cybersecurity Risks in North America?
What are the Biggest Cybersecurity Risks in North America? The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of...
New Remote Access Trojan (RAT) named Borat on the Darknet Markets
New Remote Access Trojan (RAT) named Borat on the Darknet Markets Threat actors are developing more advanced attack techniques every day. They even help non-technical attackers by publishing toolkits....
What Do You Need to Know About Spring4Shell Zero-Day Vulnerability?
What Do You Need to Know About Spring4Shell Zero-Day Vulnerability? A zero-day vulnerability that affects the Spring Core Java framework called Spring4Shell and allows RCE has been disclosed.&nbs...
Is Lapsus$ Extortion Group "Officially Back from Vacation"?
Is Lapsus$ Extortion Group “Officially Back from Vacation”? The Lapsus$ group announced that they would be on vacation until March 30 after the notorious Okta attack. In the early hours of...
SOCRadar UAE Threat Landscape Report: Runner-up for the Top 10 Targete...
SOCRadar UAE Threat Landscape Report: Runner-up for the Top 10 Targeted Countries SOCRadar’s Threat Landscape Report provides a broad perspective on cyber incidents across various countries...
Anonymous Threatened Western Companies Operating in Russia Raises Conc...
Anonymous Threatened Western Companies Operating in Russia Raises Concerns of Cyber Attack Global hacktivist group Anonymous has threatened a list of companies that continue to operate in Russia,...
Automotive Industry Under Ransomware Attacks
Automotive Industry Under Ransomware Attacks Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. Accord...
Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak
Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak The Lapsus$ group has announced that they are responsible for authentication service provider Okta’s digital breach. Threat...
SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for ...
SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for Threat Actors Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for th...
An Overview on Conti Ransomware Leaks: Is This the End for Conti?
An Overview on Conti Ransomware Leaks: Is This the End for Conti? Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There...