SIEM as a Service

Latest Cyber Security News

How to Track Advanced Persistent Threats (APT) Using Threat Intelligence Lookup Tool

How to Track Advanced Persistent Threats (APT) Using Threat Intelligence Lookup Tool

An Advanced Persistent Threat (APT) is a sophisticated and stealthy cyberattack designed to gain unauthorized, long-term access to a target's network. These attacks are...
Software Supply Chain

Researchers Hacked into Software Supply Chain and Earned $50K Bounty

Researchers found a significant software supply chain vulnerability, which resulted in an outstanding $50,500 bounty from a major corporation's bug bounty program. The duo’s success...

ZeroLogon Ransomware Exploit Active Directory Vulnerability To Gain Domain Controller Access

A significant threat has emerged in the form of the ZeroLogon ransomware exploit. This exploit targets a critical vulnerability in Microsoft's Active Directory, specifically...
zkLend Hacked

zkLend Hacked – $8.5M Stolen, Company offers 10% whitehat Bounty to Attacker

zkLend, a prominent decentralized finance (DeFi) protocol built on Ethereum's Layer-2 zk-rollup technology, has fallen victim to a major security breach resulting in the...
YouTube Bug Exploited Email Addresses

New YouTube Bug Exploited to Leak Users’ Email Addresses

A critical vulnerability in YouTube’s infrastructure allowed attackers to expose the email addresses tied to anonymous channels by combining flaws in Google’s account management...
Mirai Botnet

Mirai Botnet Exploting Router Vulnerabilities to Gain Complete Device Control

A new wave of cyberattacks has surfaced, with a Mirai-based botnet exploiting a number of significant vulnerabilities in routers and smart devices, primarily targeting...
OmniGPT

Hackers Allegedly Claiming Breach OmniGPT, 30,000+ User Accounts Exposed

Hackers have allegedly breached OmniGPT, a ChatGPT-like AI chatbot platform, exposing sensitive data of over 30,000 users.  The leaked data reportedly includes email addresses, phone...
SIEM as a Service

Recent News

F5 BIG-IP SNMP Vulnerability

F5 BIG-IP SNMP Vulnerability Let Attackers Trigger DoS Attack on System

A recently disclosed vulnerability in F5's BIG-IP system has raised significant security concerns. Identified as CVE-2025-21091, this flaw allows remote, unauthenticated attackers to trigger...
Valentine's Day

Hackers Newly Registering Valentine’s Day Themed Domains for Stealthy Cyber Attacks

Researchers have identified a surge in newly registered Valentine’s Day-themed domains, with threat actors leveraging terms like “love,” “gift,” and “Valentine” to orchestrate phishing,...
USB Army Knife

USB Army Knife – A Powerful Red Team Tool for Penetration Testers

The USB Army Knife is a versatile red-teaming tool for penetration testers that emulates a USB Ethernet adapter for traffic capture, enables custom attack...
MobSF Framework

MobSF Framework Zero-day Vulnerability Let Attackers Trigger Dos in Scans Results

A zero-day vulnerability has been discovered in the Mobile Security Framework (MobSF), an automated platform for mobile application penetration testing, malware analysis, and security...

EARLYCROW – Detecting APT Malware Command and Control Over HTTPS

Advanced Persistent Threats (APTs) represent a significant challenge for cybersecurity, targeting critical organizations with stealth and precision. Traditional Network Intrusion Detection Systems (NIDS) often fail...
Splunk AI Based Honeypot “DECEIVE

Splunk Unveils a New AI Based Honeypot “DECEIVE” to Log Attacker Activities

Splunk, a leader in data analytics and cybersecurity solutions, has introduced a groundbreaking proof-of-concept honeypot system named DECEIVE (DECeption with Evaluative Integrated Validation Engine).  This...
Web Login Pages

Hackers Attacking Web Login Pages of Popular Firewalls for Brute-Force Attacks

In recent weeks, ShadowServer has observed a significant rise in brute-force attacks targeting web login pages of edge devices, with honeypot data revealing up...

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025

January 2025 marked a significant month in the ransomware landscape, with Akira emerging as the leading threat. According to recent reports, Akira was responsible for...

Vulnerability News

Wie, seriously, do you think the EU is taking cybersecurity? Let's look at the numbers. As of 1 day ago, there were 2,289,599,662 breached records from 556 publicly disclosed incidents in the EU. The most common attack was ransomware attacks, and it was predicted that as many as 60 %...

Top 10 Cyber Security Tools