Author: Cybersecurity Analyst
-
Kaduu supports the Humanitarian Cybersecurity Center from the CyberPeace Institute
Kaduu is proud to support the CyberPeace Institute for the launch of the Humanitarian Cybersecurity Center (HCC). Introduction Geneva, Switzerland, 27 February 2023 – In the last 3 years, cybercriminals and Nation Stateactors have accessed systems and personal records, stolen millions of dollars of donations, carriedout surveillance operations, or led disinformation campaigns against non-governmentalorganizations (NGOs).…
-
Security Breach at Activision: The Importance of Reporting Incidents
Threat actors stole Activision Blizzard internal documents and content. Activision Blizzard, one of the world’s largest video game companies, suffered a data breach on December 4th, 2022. According to vx-underground, threat actors were able to “successfully phish a privileged user on the network and exfiltrate sensitive workplace documents, as well as scheduled to be released…
-
Harnessing the Power of Dark Net Monitoring for Effective Cyber Risk Mitigation
Risk mitigation is an essential component of any organization’s cybersecurity strategy. With the increasing sophistication of cyber attacks, the need for comprehensive risk management solutions has become even more pressing. One such solution that can help organizations stay ahead of their adversaries is dark net monitoring. In this blog post, we’ll discuss what dark net…
-
130 companies fell victim of Clop recent attack
GoAnywhere MFT hit by ransomware group following discovery of critical vulnerability. According to reports, the Clop ransomware operators have asserted that they are behind the recent attacks exploiting a 0-day vulnerability in GoAnywhere MFT, a secure file transfer tool. They claim to have exfiltrated data from 130 organizations as a result of the vulnerability. GoAnywhere…
-
Reddit hacked, everything you need to know
Hundreds of company contacts, advertiser and employees data is stolen. Reddit, one of the largest social media platforms, suffered a security breach on February 5th, in which threat actors were able to access internal documents and source code. The company confirmed that the attack was carried out through a spear-phishing attack. Spear-phishing attacks are a…
-
Darknet Monitoring – more than just finding leaked access data
Why HaveIbeenpwned & Co is not enough For many, darknet and deepweb monitoring only means finding logins in darknets. Services like “Have I been Pwned?” (https://haveibeenpwned.com/) but also many commercial offers give the impression that it is only about such access data. This is problematic for various reasons. For one thing, the access data almost…
-
New Kaduu Release
We are happy to announce a new version of Kaduu 2.1! It includes a few cool features. Discord Monitoring What is Discord? Discord is a popular communication platform designed for online communities and gamers. It offers a variety of features including text, voice and video chat, file sharing, and gaming integrations. Discord is available as…
-
Hackers communicating in Forums, Telegram and Discord: Why you should pay attention!
What is a hacker forum? A hacker forum is an online platform (mostly traditional websites) where individuals with an interest in hacking and information security gather to share information, exchange ideas, and collaborate on projects. These forums can be used for a variety of purposes, including discussing hacking techniques, sharing exploits and vulnerabilities, and trading…
-
How unsecured cloud data storages continue to compromise the security of organizations
What is a cloud storage provider? A cloud storage provider is a company that offers remote storage of digital data through the internet. Users can store, access, and manage their data and files on servers maintained by the provider, rather than on their own personal computers or local servers. Cloud storage eliminates the need for…
-
Google Hacking remains a valuable source for sensitive data
What is google hacking? Google hacking, also known as Google dorking, is the practice of using advanced operators in the Google search engine to find security vulnerabilities in websites. These operators can be used to search for specific file types, sensitive information, and other vulnerability-related information. It is often used by security researchers and hackers…