B1txor20 Malware Exploiting Log4J Vulnerability
B1txor20 Malware Exploiting Log4J Vulnerability Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in ...
Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication
Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code...
What Should We Learn From the Conti's HSE Ireland Attack?
What Should We Learn From the Conti’s HSE Ireland Attack? Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even targ...
'Dirty Pipe' Linux Vulnerability Discovered
‘Dirty Pipe’ Linux Vulnerability Discovered A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vul...
Ex-Adafruit Employee's GitHub Repository Leaked
Ex-Adafruit Employee’s GitHub Repository Leaked Adafruit, which produces open-source hardware components, announced that a former employee had a data leak on their GitHub repository. The fact th...
Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvid...
Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvidia Breach The infamous Lapsu$ Extortion Group has become a newsworthy threat actor while the cyber incidents escalated during the ...
Future of Cybersecurity in the Era of Metaverse
Future of Cybersecurity in the Era of Metaverse Metaverse has become a subject that everyone is curious about very soon after it has found its place in the titles. It was claimed that the term, which ...
Five Vulnerabilities Discovered in PJSIP Library This Week
Five Vulnerabilities Discovered in PJSIP Library This Week PJSIP, an open-source library, is one of the most used libraries used by WhatsApp and many other VoIP applications. Recently, critical RCE bu...
Timeline: The Russian - Ukranian Cyber Space Wars
Timeline: The Russian – Ukranian Cyber Space Wars February 13: A file matching the DDoS attack IoCs was uploaded to VirusTotal. February 15 & 16: Some Ukrainian websites were not accessible ...
What Do Conti's Leaks Tell Us about Ransomware Groups?
What Do Conti’s Leaks Tell Us about Ransomware Groups? Conti, a dangerous ransomware gang that first appeared in December 2019, resided in Saint Petersburg, Russia, from the very beginning. Duri...
What You Need to Know About Russian Cyber Escalation in Ukraine
What You Need to Know About Russian Cyber Escalation in Ukraine UPDATE February 26, 2022, 04.40 AM (EST): This blog has been updated with details of posts of the Conti ransomware group and Anonymous. ...
Gartner Recognizes SOCRadar as ‘Both EASM and DRPS’ Vendor
Gartner Recognizes SOCRadar as ‘Both EASM and DRPS’ Vendor Gartner published “Quick Answer: What is the Difference Between EASM, DRPS, and SRS?” on February 21, 2022. SOCRadar was among th...
SOCRadar Turkey Threat Landscape Report: 'Skyrocketing Ransomware Thre...
SOCRadar Turkey Threat Landscape Report: ‘Skyrocketing Ransomware Threats in 2021’ Ransomware attacks are on the rise around the world. In 2021, we saw the names of various threat actors i...
What is an Accellion Cyber Attack?
What is an Accellion Cyber Attack? Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospit...
Dozens of WordPress Plugins Backdoored in Supply Chain Attack
Dozens of WordPress Plugins Backdoored in Supply Chain Attack Dozens of WordPress themes and plugins hosted on a developer’s website were backdoored in a supply chain attack. with malicious code in Se...
SOCRadar New Threat Landscape Report: Financial Institutions are Most ...
SOCRadar New Threat Landscape Report: Financial Institutions are Most Targeted Sector in the UK SOCRadar Threat Landscape Report provides U.K. organizations with an understanding of evolving cyber thr...
Microsoft Releases Emergency Updates for Windows Server 2019
Microsoft Releases Emergency Updates for Windows Server 2019 Microsoft has released “out-of-band” emergency updates to fix various critical bugs that emerged after its updates for Jan...
Cisco Fixes a Critical Flaw in Unified CCMP and Unified CCDM
Cisco Fixes a Critical Flaw in Unified CCMP and Unified CCDM Cisco fixed a critical privilege escalation vulnerability, tracked as CVE-2022-20658, in Unified CCMP and Unified CCDM.On the oth...
Microsoft Fixes Six Zero-Days and 97 Flaws Including an Exchange Vulne...
Microsoft Fixes Six Zero-Days and 97 Flaws Including an Exchange Vulnerability Microsoft fixes a total of 97 security vulnerabilities, including six zero-day vulnerabilities. In an update, the c...
AvosLocker's New Linux Variant Targets VMware ESXi Servers
AvosLocker’s New Linux Variant Targets VMware ESXi Servers A Linux variant of the AvosLocker gang, which first appeared in the summer of 2021 and conducted its operations in RaaS style, targetin...