Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges
Top 10 Dark Web Search Engines

Blog Discover the top 10 Dark Web search engines for safe, anonymous browsing of hidden sites and resources. What Is the Dark Web, and Why Does It Exist? The dark web is an unknown hidden part of the internet that cannot be accessed with default browsers. It can be accessed using specialized software and allows […]
Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks
What is Threat Intelligence? – All You Need to Know About Cyber Threat Intelligence

Blog Cyber threat intelligence is a crucial aspect of cybersecurity and is becoming increasingly important as threats evolve and become more sophisticated. In this content, prepared by ThreatMon experts, we will explore cyber threat intelligence and its benefits to organizations and provide an overview of threat intelligence platforms. Businesses need to understand that relying solely […]
What is the OpenSSL Version Vulnerability?

Blog Learn about the OpenSSL version vulnerability, a flaw in the popular encryption library that can expose sensitive data, emphasizing the importance of updates to mitigate security risks. On October 25, the OpenSSL team has announced that a security patch for a critical vulnerability in OpenSSL version 3.x was being prepared. In addition to that […]
SQL Injection Failure and Flaws Have Been Patched by Vmware

Blog SQL Injection Failure SQL Injection Failure and Flaws That Allow Remote Attackers to Execute Code Remotely Have Been Patched by Vmware. The proof-of-concept exploit code is publicly available for a critical authentication bypass vulnerability in multiple VMware products that allows attackers to gain administrative privileges. VMware has previously released updates to the vulnerability (CVE-2022-31656, […]
Cisco Has Been Hacked by Yanluowang Ransomware Group

Blog Cisco’s corporate network was breached by the Yanluowang ransomware group Cisco has confirmed that the Yanluowang ransomware group has breached the company’s network and that the actor has attempted to extort the stolen files under threat of leaking them online. Cisco said on May 24, 2022 that it became aware of a possible compromise. […]
USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang

Blog A Reward for Information About The Conti Ransomware Group USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang. As part of the Justice Awards program, the US State Department announced that a $10 million reward will be offered for information on five high-ranking Conti ransomware members, including the first reveal of […]
PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems

Blog PyPI Package ‘secretslib’ PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems. A PyPI package named “secretslib” has been identified by Sonatype, which describes itself as “secret mapping and verification made easy”. The package secretly runs cryptominers in the memory of the Linux machine, a technique largely used by fileless malware and cryptominers. Secretslib […]
Microsoft Has Disrupted SEABORGIUM Phishing Operation

Blog Seaborgium Phishing Operation The Microsoft Threat Intelligence Center (MSTIC) has taken action and taken measures to disrupt the campaigns launched by the SEABORGIUM actor, which has been tracked since 2017. SEABORGIUM is a threat actor with goals aligned with the interests of the Russian state. SEABORGIUM is a threat actor that often targets the […]