Subscribe to our mailing list to receives daily updates!
In October 2024, we were aware of a series of high-risk Common Vulnerabilities and Exposures (CVEs) for organizations and users....
As the US heads toward its presidential election in 2024, a cyber attack hangs over the voting process. As foreign...
August 2024 again saw an uptick in the number of vulnerability disclosures, with several commonly exploited Common Vulnerabilities and Exposures...
During the past few years, the chronic military and political dimensions of the conflict between Israel and Iran have progressively...
The CyberVolk Ransomware represents a significant and evolving cyber threat, crafted by the financially motivated CyberVolk group, an Indian hacker...
Over the past several years, ransomware attacks have skyrocketed and are now among the most costly and perilous threats to...
In recent years, the cybersecurity landscape has witnessed the emergence of a new and formidable threat group known as AzzaSec....
July 2024 is not a normal reporting month as 22,254 Common Vulnerabilities and Exposures (CVEs) were reported in the middle...
The Paris Olympics 2024 will be a landmark event, attracting athletes and visitors from around the globe. However, this grandeur...
The Russian influence operations aimed at the Paris Olympics 2024 differ in a number of meaningful ways from earlier campaigns,...
AzzaSec Ransomware, developed by the AzzaSec Hacktivist Group, represents a significant cybersecurity threat due to its sophisticated features and destructive...
In today's interconnected digital world, platforms like GitHub have become indispensable for developers. They enable seamless collaboration, effective version control,...
In the ever-evolving world of cybersecurity, new threats emerge constantly, challenging our defenses and requiring continuous vigilance. One such threat...
1.CrowdStrike Windows Outage: What Happened?A recent CrowdStrike update caused severe disruptions, including high CPU usage on macOS systems and the...
Phishing attacks use increasingly sophisticated techniques bolstered by cutting-edge technology and are increasingly effective at outfoxing all but the most...
What will cybersecurity look like by the midpoint of 2024?The evolving landscape during the first half of the year showed...
As more and more vulnerabilities and security flaws have surfaced throughout the rapidly changing cyber landscape, the need to keep...
The new era of the digital domain has brought the world closer together in unprecedented ways, offering a level of...
The Polyfill.io Scandal: What Happened?A highly used open-source JavaScript library, Polyfill.io helps to enable older browsers to implement modern web...
Organizations are acting under duress. So much has changed in the digital sphere so quickly. The ever-increasing sophistication and interconnected...
In the past few years, one cybersecurity evolution has stood out to me as a particularly concerning development. That is...
In May 2024, one of the largest number of vulnerabilities and security wrongdoings in this ever-changing cyber world were discovered....
Personal data has now become the most valued form of commodity. It is often traded on black markets and is...
Introduction APT44 is also known as Sandworm, FROZENBARENTS, Seashell, Quedagh, VOODOO BEAR, and TEMP.Noble, IRON VIKING, G0034, ELECTRUM, TeleBots, IRIDIUM, Blue...
IntroductionAxiom APT Group, known as Group 72, originates from China and has been conducting sophisticated, persistent threat attacks since 2008....
External Attack Surface Management (EASM) is vital to modern cybersecurity strategies. EASM is gaining importance as organizations' digital footprints expand...
APT33 APT33 is a group of APTs also known as Elfin, MAGNALLIUM, Refined Kitten, HOLMIUM, COBALT TRINITY, G0064, ATK35, ATK 35,...
IntroductionDiscovered in 2010 and originating from China, Lotus Panda is an APT group also known as Spring Dragon, ST Group,...
What is the Dark Web Forum? Why do These Exist?Those who advocate anonymity, freedom of expression, and privacy heavily use...
IntroductionDiscovered in 2014 and originating from Iran, APT39 has carved out a unique place for itself on the global cybersecurity...