News
Welcome to our cybersecurity news section, your central hub for staying informed about the ever-evolving digital landscape. Here, we delve into the critical realm of cyber threats, examining the latest attacks, vulnerabilities, and defense strategies that shape our interconnected world. Beyond the challenges, we also highlight the burgeoning opportunities within cybersecurity, particularly the exciting prospect of acquiring valuable certifications through freely accessible online resources. Whether you're a seasoned professional or just beginning your journey, this section will provide you with crucial insights into both the dangers lurking in cyberspace and the pathways to becoming a skilled guardian against them. Stay vigilant, stay informed, and explore the chance to empower yourself with in-demand cybersecurity expertise without financial barriers.
Cyber Threat
What is Cyber Threat?
A cyber threat is any malicious activity or potential for such activity that aims to, Below is an audio that talk about one of a cyber threat case from FBI.
- Damage or destroy data: This includes deleting files, corrupting systems, or rendering data unusable.
- Steal data: This involves gaining unauthorized access to sensitive information like personal details, financial data, trade secrets, or intellectual property.
- Disrupt digital life or operations: This can range from making a website unavailable (Denial of Service attacks) to taking control of critical infrastructure.
Cyber threats exploit vulnerabilities in computer systems, networks, software, and even human behavior to achieve these malicious goals. They are carried out by various actors, including individual hackers, criminal organizations, state-sponsored groups, and even unintentional insiders.
Here are some of the latest news regarding cyber threats as of Saturday, April 12, 2025:
- Data Breaches and Incidents
- Malware and Vulnerabilities
- Threat Actors and Campaigns
- General Trends and Reports
Data Breaches and Incidents:
- US Lab Testing Provider Data Breach: Laboratory Services Cooperative (LSC) reported a data breach affecting approximately 1.6 million individuals. Hackers reportedly stole sensitive personal information from their systems. [Reference]
- Moroccan Cybercrime Group Targeting Retailers: A group known as Atlas Lion has been observed using stolen credentials to enroll their virtual machines into organizations' cloud domains, specifically targeting retailers. [Reference]
- WordPress Plugin Vulnerability Exploited: A critical vulnerability in the SureTriggers (formerly OttoKit) WordPress automation plugin, affecting over 100,000 websites, is being actively exploited. This flaw could allow attackers to create administrative accounts and take full control of the affected sites. [Reference]
- South African Telecom Data Leak: Telkom, a major South African telecommunications provider with 7.7 million customers, confirmed a data leak following a cyberattack. [Reference]
- Oregon Environmental Agency Cyberattack: The Oregon Department of Environmental Quality shut down its network due to a cyberattack. [Reference]
- Treasury's OCC Email Security Incident: The Office of the Comptroller of the Currency (OCC) disclosed that hackers had access to around 150,000 emails for over a year. [Reference]
Malware and Vulnerabilities:
- Crypto Wallets Targeted via Malicious NPM Package: A new NPM package named
pdf-to-office, disguised as a PDF to Word converter, injects malicious code into cryptocurrency wallet software associated with Atomic Wallet and Exodus. [Reference] - Sapphire Werewolf Upgrades with Amethyst Stealer: The Sapphire Werewolf threat actor has introduced a new version of the Amethyst stealer, employed in phishing attacks against energy firms. [Reference]
- New Backdoor Targeting US and Mexican Organizations: A Chinese threat actor, FamousSparrow, has been linked to attacks using previously undocumented versions of the SparrowDoor backdoor and, for the first time, ShadowPad malware. [Reference]
- Paper Werewolf Deploying New Implant in Russia: The Belarus-linked group Paper Werewolf (also known as GOFFEE) is targeting Russian entities with a new implant called PowerModul. [Reference]
- Dell PowerScale OneFS Vulnerabilities: Dell has addressed multiple security vulnerabilities in its PowerScale OneFS network-attached storage operating system. [Reference]
- SonicWall NetExtender VPN Client Patches: SonicWall has released patches for several vulnerabilities in its NetExtender Windows VPN client. [Reference]
- AI-Powered Spam Bot: A new bot called AkiraBot uses AI to bypass CAPTCHAs and post AI-generated spam on websites at scale. [Reference]
- Incomplete Patch in NVIDIA Container Toolkit: Researchers found an incomplete patch for a previous vulnerability in the NVIDIA Container Toolkit that could still allow container escape attacks. [Reference]
- Android Malware Delivered via Fake Antivirus Site: A bogus website impersonating Avast antivirus is being used to spread the SpyNote Android Remote Access Trojan (RAT). [Reference]
- New Telegram-Based Backdoor: A newly discovered Golang-based backdoor uses Telegram for command and control. [Reference]
Threat Actors and Campaigns:
- China Admits to Volt Typhoon Attacks: In a secret meeting, Chinese officials reportedly admitted to conducting cyberattacks on US critical infrastructure. [Reference]
- Russian Hackers Target Romania's Election Systems: Over 85,000 cyberattacks targeted Romanian election systems prior to the presidential vote, with leaked credentials found on Russian hacker forums. [Reference]
- Iranian Hackers Targeting Aerospace and Defense: Iranian threat actors are reportedly targeting aerospace, defense, and aviation industries in several Middle Eastern and Asian countries using fake job offers on LinkedIn to distribute malware. [Reference]
- AI Used in Spear Phishing: Analysis indicates that AI is now outperforming humans in creating more convincing spear-phishing attacks. [Reference]
General Trends and Reports:
- UK Cyber Security Breaches Survey 2025: This survey highlights a rise in ransomware attacks in the UK, doubling since 2024, and notes that phishing remains the most common attack vector. It also indicates a decline in board-level responsibility for cybersecurity in UK businesses. [Reference]
- CyberCX 2025 Threat Report: This report indicates that Business Email Compromise (BEC) remains a top incident type, with attackers increasingly bypassing multi-factor authentication. Healthcare is identified as the most impacted sector. [Reference]
- World Economic Forum's Global Cybersecurity Outlook 2025: This report anticipates increasingly sophisticated attacks in 2025, with ransomware, social engineering, and AI-powered cybercrime being major concerns. It also highlights the gap between awareness of AI risks and the lack of safeguards for AI tools. [Reference]
This is just a snapshot of the recent cyber threat landscape, which is constantly evolving. Staying informed about these developments is crucial for individuals and organizations to protect themselves.
Free Online Cybersecurity & SOC Courses with Certificates
Opportunities for Free Learning
The fields of Cybersecurity and Security Operations Center (SOC) analysis are rapidly growing, and there are numerous opportunities to gain foundational knowledge and skills online for free. Many reputable organizations and platforms offer introductory courses, and some even provide free certificates or badges upon completion. These resources can be a great starting point for aspiring professionals or those looking to enhance their understanding of cyber threats and defense mechanisms.
Below are examples of platforms and specific courses offering free training related to Cybersecurity and SOC, often including a free certificate or badge upon completion. Please note that while course content is often free, sometimes official certifications linked to paid exams or full access might require payment.
- Great Learning
- Cisco Networking Academy
- IBM
- Google (via Coursera)
- EC-Council
- Oxford Home Study Centre
- Udemy
- Splunk
- Microsoft Learn
- SANS Cyber Aces
- Cybrary
- LetsDefend
- TryHackMe
- Palo Alto Networks
- CISA Learning
- Other Platforms (Free Content/Audit)
Great Learning
- Courses: Offers various free introductory courses such as "Introduction to Cyber Security," "Types of Cyber Security," "Introduction to Information Security," "Advanced Cyber Security," and "Introduction to Ethical Hacking."
- Topics Covered: Fundamentals, Threat Landscape, Information Security Basics, Ethical Hacking Concepts, Network Security, Encryption.
- Certificate: Provides free certificates of completion for its free courses.
- Link: [Reference]
Cisco Networking Academy
- Course: "Introduction to Cybersecurity"
- Topics Covered: Basic cyber threats, network security fundamentals, threat detection basics. Suitable for beginners.
- Certificate: Offers a certificate upon completion. Also offers a more in-depth (intermediate level) course on "Security Operations Center (SOC)" via platforms like Coursera (audit likely free, certificate paid).
- Link (Intro): [Reference - Search Cisco Networking Academy]
- Link (SOC via ClassCentral): [Reference]
IBM
- Course: "Cybersecurity Fundamentals" (via various platforms like edX or IBM's own)
- Topics Covered: Overview of cybersecurity tools, techniques, incident response, security operations, frameworks, and processes.
- Certificate: Offers a free digital badge upon completion for some versions of the course. Note: Full professional certificates like the "IBM Cybersecurity Analyst" on Coursera usually require payment, though auditing content may be free.
- Link (Example on edX): [Reference]
Google (via Coursera)
- Course: "Google Cybersecurity Professional Certificate"
- Topics Covered: Foundations of Cybersecurity, Network Security, Incident Response, Threat Management, SIEM tools, Linux, SQL, Python for security. Designed for beginners aiming for entry-level roles.
- Certificate: This specific professional certificate program is often mentioned as being available with financial aid or potentially free access via Coursera, making the certificate achievable at no cost for eligible individuals. Auditing course content is generally free.
- Link: [Reference]
EC-Council
- Courses: Offers a free "Essentials Series" including Ethical Hacking Essentials (EHE), Network Defense Essentials (NDE), and Digital Forensics Essentials (DFE). Also provides other free courses like "Introduction to Dark Web, Anonymity, and Cryptocurrency."
- Topics Covered: Foundational knowledge in ethical hacking, network defense concepts, digital forensics basics.
- Certificate: The "Essentials Series" aims to make aspirants industry-ready; check specific terms regarding free certificates for these introductory courses.
- Link: [Reference]
Oxford Home Study Centre
- Courses: Provides free short courses in Cyber Security.
- Topics Covered: Introduction to cyber security concepts, identifying and preventing threats.
- Certificate: Offers free certificates upon completion of their free courses.
- Link: [Reference]
Udemy
- Course Example: "SOC Analyst Essentials: Introduction to Cybersecurity (FREE)"
- Topics Covered: SOC basics, cybersecurity tools, threat detection, malware analysis, core skills for aspiring SOC analysts. Beginner-friendly.
- Certificate: Udemy's free courses often come with a free certificate of completion (does not carry the same weight as paid course certificates or official certifications).
- Link: [Reference]
Splunk
- Course: "Splunk Fundamentals 1"
- Topics Covered: Using Splunk (a widely used SIEM tool in SOCs) for data collection, searching, reporting, and visualization of security data.
- Certificate: While the course is free and provides critical SOC skills, a formal Splunk certification typically requires a paid exam. Completing the free training is highly valuable for SOC roles.
- Link: [Reference - Search Splunk Fundamentals 1]
Microsoft Learn
- Learning Path: "Microsoft Security Operations Analyst" (SC-200 path)
- Topics Covered: Threat management, monitoring, and response using Microsoft Azure Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. Covers incident triage, threat hunting, log evaluation.
- Certificate: The learning path/modules are free. The official SC-200 certification exam requires payment, but the knowledge gained is directly applicable to SOC roles, especially in Azure environments.
- Link: [Reference - Search Microsoft Learn SC-200]
SANS Cyber Aces Online
- Courses: Offers free foundational courses covering core concepts in information security, operating systems, networking, and system administration.
- Topics Covered: Fundamentals needed to understand and protect information security systems.
- Certificate: Provides free training content; certificates are typically associated with paid SANS courses and GIAC certifications.
- Link: [Reference]
Cybrary
- Courses: Offers a vast library with many free introductory courses and labs (e.g., OSINT fundamentals, Kali Linux basics, MITRE ATT&CK). Career paths like "SOC Analyst Level 1" can be started for free.
- Topics Covered: Defensive security, log analysis basics, security ticketing, network detection, host-based detection, various security tools.
- Certificate: Free courses are available. Full career paths, assessments, and shareable completion badges typically require a paid subscription.
- Link: [Reference]
LetsDefend
- Courses/Path: Offers free beginner training modules within its "SOC Analyst Learning Path" (e.g., SOC Fundamentals, Phishing Email Analysis). Also provides a platform with free challenges.
- Topics Covered: SOC basics, threat hunting, incident response, malware analysis basics, SIEM concepts.
- Certificate: Free modules provide foundational knowledge. Full access to the learning path and associated certificates likely requires payment.
- Link: [Reference] / [Reference]
TryHackMe
- Paths/Labs: Offers gamified learning paths like "Cyber Defence," "SOC Level 1," and "Jr Penetration Tester" with many free introductory rooms and labs.
- Topics Covered: Network security, endpoint monitoring, SIEM tools (Splunk, ELK), forensics, traffic analysis (Wireshark, Zeek), vulnerability management. Very hands-on.
- Certificate: Many introductory labs are free. Full learning path access and completion certificates generally require a paid subscription.
- Link: [Reference]
Palo Alto Networks (Beacon Platform)
- Courses: Free fundamental courses: "Introduction to Cybersecurity," "Fundamentals of Network Security," "Fundamentals of Cloud Security," "Fundamentals of SOC."
- Topics Covered: Basic concepts across different cybersecurity domains, including Security Operations Center frameworks, processes, and technology.
- Certificate: Requires a free Beacon account to access courses. While Palo Alto offers paid certifications (like PCCET), these fundamental courses provide valuable knowledge freely. Certificate status for the free courses themselves is unclear but course completion is trackable within Beacon.
- Link: [Reference]
CISA Learning
- Courses: Offers free online, on-demand cybersecurity training for various levels, replacing the FedVTE platform. Includes topics like incident response, risk management, ethical hacking, cloud security.
- Topics Covered: Broad range of cybersecurity topics, including incident response training curriculum (awareness, best practices, cyber range exercises).
- Certificate: Training is free for federal employees and available to non-federal cybersecurity professionals. Focus is on skill-building and knowledge; certificate details may vary by course.
- Link: [Reference] / [Reference]
Other Platforms (Free Content/Audit)
- Coursera: Offers courses from universities and companies (Google, IBM, Microsoft). You can often "audit" courses for free to access materials, but certificates usually require payment or financial aid. [Reference]
- edX: Similar to Coursera, provides courses from institutions like Harvard, IBM, RIT. Free auditing is common, verified certificates are typically paid. [Reference]
- MIT OpenCourseWare: Provides free access to course materials (lecture notes, videos) from MIT courses, including computer science and cybersecurity topics. No certificates. [Reference - Search MIT OCW]
- Khan Academy: Offers foundational computing, networking, and cryptography courses essential for cybersecurity understanding. Completely free. [Reference - Search Khan Academy Computing]
- OWASP Foundation: Not a course platform, but provides essential free resources, tools, and guides (like OWASP Top 10) for web application security. [Reference - Search OWASP]
- Alison: Offers numerous free certificate and diploma courses in cybersecurity topics. While courses are free, there might be a fee to obtain the physical or digital certificate/diploma after completion. [Reference]
This list provides a starting point for exploring free educational resources in Cybersecurity and SOC. Remember to always check the specific terms for each course regarding content access and certificate availability/cost.