fraud, time, cybersecurity data Emotet Spring4Shell ransomware API security cyberattack threats fraud

Best of 2022: New Spring4Shell Zero-Day Vulnerability Confirmed: What it Is and How to Prepare

On March 29, 2022, a Chinese cybersecurity research firm leaked an attack that could impact most enterprise Java applications, globally. An investigation of the issue showed that the root cause was a ...
1Password's Blue Ocean Strategy

Best of 2022: 1Password’s Blue Ocean Strategy

| | Case Studies
A deep dive into 1Password's strategy and future after its massive Series C funding announcement ...

Best of 2022: New text2shell RCE vulnerability in Apache Common Texts CVE-2022-42889

Yet another RCE with a CVSS score of 9.8 out of 10 was disclosed a few hours ago. This issue looks like the same Log4shell and it seems even more dangerous since ...

Best of 2022: Update on 0-day vulnerabilities in Spring (Spring4Shell and CVE-2022-22963)

| | API security
Quick update There are two vulnerabilities: one 0-day in Spring Core which is named Spring4Shell (very severe, exploited in the wild no CVE yet) and another one in Spring Cloud Function (less ...
hulk

Best of 2022: 16 Best DDOS Attack Tools in 2022

What are DDOS attack tools? DDOS attacks are cyber- attacks targeted at rendering certain computers, network systems and servers non-functional. The processes involved in its execution can be however complicated. Attackers have ...
Best of 2022: OpenSSL Critical Vulnerability: Should You Be Spooked?

Best of 2022: OpenSSL Critical Vulnerability: Should You Be Spooked?

| | Blog, Red Team
On Tuesday, October 25 a new OpenSSL hot-fix release was announced which will patch a critical vulnerability that exists within the v3.0.X branch. OpenSSL 3.0.7 will be released on Tuesday, November 1 ...
Fake Amazon Emails sent by Hackers How to prevent Phishing Scams

Best of 2022: Fake Amazon Emails sent by Hackers: How to prevent Phishing Scams

| | General
If you haven't yet received phishing emails pretending to be from Amazon, you will soon. Luckily, there are a few steps that can help protect your account and data. The post Fake ...
8 Motives of CyberCrime

Best of 2022: 8 Motives of CyberCrime – Hackers World

| | Cyber Security, Hacking
Motives of cybercrime have changed based on day-to-day life. In the 1960s and 1980’s cybercrime doing for fun and using things for free. Nowadays cyber crimes have become very dangerous. In general, ...
Cybersecurity's 2022 IPO Pipeline (Part 2)

Best of 2022: Cybersecurity’s 2022 IPO Pipeline (Part 2)

| | IPOs
The last of a two part series projecting the industry's most likely IPO candidates for the upcoming year ...
ransomware

Best of 2022: The Rise of Cybercrime – An Overview

Cybercrimes are more rampant in the year 2022. The rate of cybercrimes is increasing every year, and it is expected to reach its highest next year. It is said that cybercrime affects ...

Application Security Check Up