Subscribe to our mailing list to receives daily updates!
The month of September 2024 is exceptional for the many high-severity flaws that may hurt organizations and individual users. Several...
The ServiceNow Knowledge Base (KB) leak exposed sensitive corporate data from over 1,000 instances of the platform, largely due to...
July 2024 is not a normal reporting month as 22,254 Common Vulnerabilities and Exposures (CVEs) were reported in the middle...
The Paris Olympics 2024 will be a landmark event, attracting athletes and visitors from around the globe. However, this grandeur...
The Russian influence operations aimed at the Paris Olympics 2024 differ in a number of meaningful ways from earlier campaigns,...
AzzaSec Ransomware, developed by the AzzaSec Hacktivist Group, represents a significant cybersecurity threat due to its sophisticated features and destructive...
In today's interconnected digital world, platforms like GitHub have become indispensable for developers. They enable seamless collaboration, effective version control,...
In the ever-evolving world of cybersecurity, new threats emerge constantly, challenging our defenses and requiring continuous vigilance. One such threat...
1.CrowdStrike Windows Outage: What Happened?A recent CrowdStrike update caused severe disruptions, including high CPU usage on macOS systems and the...
Phishing attacks use increasingly sophisticated techniques bolstered by cutting-edge technology and are increasingly effective at outfoxing all but the most...
What will cybersecurity look like by the midpoint of 2024?The evolving landscape during the first half of the year showed...
As more and more vulnerabilities and security flaws have surfaced throughout the rapidly changing cyber landscape, the need to keep...
The new era of the digital domain has brought the world closer together in unprecedented ways, offering a level of...
The Polyfill.io Scandal: What Happened?A highly used open-source JavaScript library, Polyfill.io helps to enable older browsers to implement modern web...
Organizations are acting under duress. So much has changed in the digital sphere so quickly. The ever-increasing sophistication and interconnected...
In the past few years, one cybersecurity evolution has stood out to me as a particularly concerning development. That is...
In May 2024, one of the largest number of vulnerabilities and security wrongdoings in this ever-changing cyber world were discovered....
Personal data has now become the most valued form of commodity. It is often traded on black markets and is...
Introduction APT44 is also known as Sandworm, FROZENBARENTS, Seashell, Quedagh, VOODOO BEAR, and TEMP.Noble, IRON VIKING, G0034, ELECTRUM, TeleBots, IRIDIUM, Blue...
IntroductionAxiom APT Group, known as Group 72, originates from China and has been conducting sophisticated, persistent threat attacks since 2008....
External Attack Surface Management (EASM) is vital to modern cybersecurity strategies. EASM is gaining importance as organizations' digital footprints expand...
APT33 APT33 is a group of APTs also known as Elfin, MAGNALLIUM, Refined Kitten, HOLMIUM, COBALT TRINITY, G0064, ATK35, ATK 35,...
IntroductionDiscovered in 2010 and originating from China, Lotus Panda is an APT group also known as Spring Dragon, ST Group,...
What is the Dark Web Forum? Why do These Exist?Those who advocate anonymity, freedom of expression, and privacy heavily use...
IntroductionDiscovered in 2014 and originating from Iran, APT39 has carved out a unique place for itself on the global cybersecurity...
What Is the Dark Web, and Why Does It Exist?The dark web is an unknown hidden part of the internet...
Cyber threat intelligence is a crucial aspect of cybersecurity and is becoming increasingly important as threats evolve and become more...
On October 25, the OpenSSL team has announced that a security patch for a critical vulnerability in OpenSSL version 3.x...
The proof-of-concept exploit code is publicly available for a critical authentication bypass vulnerability in multiple VMware products that allows attackers...
Cisco has confirmed that the Yanluowang ransomware group has breached the company’s network and that the actor has attempted to...