Latest
News
The “World’s Most Harmful Cyber Crime Group” Taken Down
The United Kingdom's National Crime Agency (NCA) unveiled that an initiative dubbed Operation Cronos has led to the acquisition of the LockBit ransomware's source code, alongside vital intelligence concerning the nefarious activities of its affiliates.
Unmasking LockBit: The Illusion of Safety in...
Attacks & Breaches
The Canadian Clampdown on Flipper Zero: A Move Against Auto Theft
In a decisive step aimed at curbing the escalating wave of car thefts, the Canadian government has set its sights on banning Flipper Zero, a device increasingly implicated in vehicular thefts across the nation. This initiative, announced by Canadian Industry Minister...
News
CISA Warns on Known Exploited Vulnerability ‘Roundcube’
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) included a well-known vulnerability in its Known Exploited Vulnerabilities (KEV) catalog, highlighting the urgency of addressing this issue due to active exploitation attempts.
Unveiling the Vulnerability: A Deep Dive
Identified as CVE-2023-43770, this vulnerability carries...
Articles
Attacks & Breaches
Attacks & Breaches
Breaking: Major Firms Hit by Alarming Ransomware Blitz!
In an era where digital data is as valuable as physical assets, the specter of cyber threats looms large. Two recent incidents at Sabre Insurance and Fidelity National Finance (FNF) have cast a spotlight on a particularly insidious form of these...
Attacks & Breaches
Botnet Spreads Mirai Malware via Zero-Day Vulnerabilities
In the ever-evolving landscape of cybersecurity threats, a new and active malware campaign has emerged, employing not one but two zero-day vulnerabilities. These vulnerabilities come equipped with remote code execution (RCE) capabilities, enabling the malicious actors behind them to ensnare routers...
Attacks & Breaches
LockBit Ransomware Group Leaks Alleged Boeing Files After Cyberattack
The LockBit ransomware group has reportedly leaked gigabytes of files claimed to be stolen from aerospace giant Boeing.
The group initially named Boeing on its leak website, stating that a substantial amount of sensitive data had been taken, but later removed...
Attacks & Breaches
Chess.com Faces Data Breach: Over 800,000 User Records Leaked
A threat actor known as 'DrOne' has claimed responsibility for leaking a scraped database from Chess.com, a popular online platform for chess enthusiasts, exposing the personal data of over 800,000 registered users.
The leaked records, disclosed on Breach Forums, include full...
Attacks & Breaches
Ransomware Attack on China’s Biggest Bank Disrupts Treasury Market Trades
Wall Street is grappling with the repercussions of a ransomware attack on China's Industrial and Commercial Bank of China (ICBC), the nation's largest bank. The attack, which targeted ICBC's New York unit, disrupted trading in the $25 trillion market for US...
Popular
Five Penetration Testing Frameworks and Methodologies
Pentesting aims to evaluate information security measures through the eyes of a potential attacker with the aim of testing the effectiveness of security controls.
A security practitioner tasked with penetration...
Defense in Depth – The Layered Approach to Cybersecurity
Defense In Depth is a common terminology in modern-day cybersecurity practices. It is a strategy that employs a series of mechanisms, also known as controls, to stop an attack...
How to Become a Cybersecurity Expert
Cybersecurity has become increasingly popular in the last decade. It has seen great interest from technical and non-technical people wanting to take their opportunity in the field.
Security breaches...
Learning Resources
How to Become a Cybersecurity Expert
Cybersecurity has become increasingly popular in the last decade. It has seen great interest from technical and non-technical people wanting to take their opportunity in the field.
Security breaches...
A List of Tools to Help you Detect the Log4j Vulnerability
How can you detect the Log4j zero day vulnerability (known as Log4shell)? Here’s a list of FREE Log4j vulnerability scanner tools.
Amazon Inspector and AWS
The Amazon Inspector team has created coverage for...
Find Information About a Person on Instagram with OSINTgram
OSINT or "Open Source INTeligence" plays a critical role in the field of cybersecurity. It can be used by your company to boost your company's defenses or as a...
Penetration Testing
Five Penetration Testing Frameworks and Methodologies
Pentesting aims to evaluate information security measures through the eyes of a potential attacker with the aim of testing the effectiveness of security controls.
A security practitioner tasked with penetration...
A List of Tools to Help you Detect the Log4j Vulnerability
How can you detect the Log4j zero day vulnerability (known as Log4shell)? Here’s a list of FREE Log4j vulnerability scanner tools.
Amazon Inspector and AWS
The Amazon Inspector team has created coverage for...
Find Information About a Person on Instagram with OSINTgram
OSINT or "Open Source INTeligence" plays a critical role in the field of cybersecurity. It can be used by your company to boost your company's defenses or as a...