
The "Evil" of Everything - Part II: Evilginx and EvilQR Rises AitM
The “Evil” of Everything – Part II: Evilginx and EvilQR Rises AitM In the ever-evolving landscape of cybersecurity threats, it is imperative to maintain vigilance and adaptability. ...

The "Evil" of Everything - Part I: EvilProxy Rises AitM
The “Evil” of Everything – Part I: EvilProxy Rises AitM In today’s digital era, detecting a burgeoning type of cyberattack, known as Adversary-in-the-Middle (AiTM) attacks, is...

Decrypting the Shadows: Revealing the Secrets of Ransomware Operators ...
Decrypting the Shadows: Revealing the Secrets of Ransomware Operators – An Interview with @htmalgae Meet @htmalgae, an anonymous security researcher with a wealth of experience in web applicatio...

Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Inve...
Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Investments in Cyber Security We are delighted to present an exclusive interview with Nigel Simpson, Head of Global Cybersecurity for ...

Overview of TIBER-EU From Threat Intelligence Perspective
Overview of TIBER-EU From Threat Intelligence Perspective Financial institutions are crucial for the global economy. They hold trillions of dollars in assets and billions of customer records. As such,...

Top 10 Facts About MOVEit Breach
Top 10 Facts About MOVEit Breach In the ever-evolving cybersecurity landscape, breaches have become all too common, sending shockwaves through industries and leaving organizations scrambling to recove...

Mother of the Threats: Threat as a Service
Mother of the Threats: Threat as a Service Anonymous Russia’s botnet service Tesla-bot announced a new malicious service model on its Telegram channel. This new type of service and concept, whic...

Major Cyberattacks in Review: August 2023
Major Cyberattacks in Review: August 2023 August 2023 has not passed without its share of significant cyberattacks. Among the incidents of last month, we have observed multiple data breaches involving...

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...

Main Analytical Frameworks for Cyber Threat Intelligence
Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...

QakBot, One of The Most Observed Malware
QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...

The Role of Threat Intelligence in Anti-Fraud Efforts
The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...

Chain Reactions: Footprints of Major Supply Chain Attacks
Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs...

Guarding the Gates: An Exploration of the Top Supply Chain Attacks
Guarding the Gates: An Exploration of the Top Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construction...

Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...
Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with...

Raccoon Stealer Resurfaces with New Enhancements
Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...

Top 10 DDoS Attacks
Top 10 DDoS Attacks While the concept of a “DDoS attack” might seem intricate, its core essence is actually relatively straightforward. A common strategy involves overwhelming a targeted server with a...

On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild [Update] November 9, 2023: “End of an Era, the Sinking of Ransomed.VC” [Update] October 5, 2023: See the subheading: “RansomedVC De-ano...

Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a pop...