Latest articles from SOCRadar
In the dynamic field of cybersecurity, staying abreast of new vulnerabilities is crucial. The recent discovery of two significant vulnerabilities in the Citrix Hypervisor, a widely used virtualization management tool, underscores this necessity. This blog… Continue Reading
During the cyberwarfare caused by the Israel-Palestine conflict and Russia's invasion of Ukraine in cybersecurity, it's paramount to stay updated on the latest threats to be alerted. Recently, KillNet, a Russian-speaking group that took a pro-Palestinian… Continue Reading
In the ever-evolving landscape of cybersecurity, staying ahead of threats is paramount for security professionals. Recently, SolarWinds Access Rights Manager (ARM), a comprehensive access management solution, has been the focus due to multiple discovered vulnerabilities.… Continue Reading
Search engines like Google have become our primary navigators in the vast world of the internet. However, with its vastness comes vulnerability. Even the giants aren't immune to occasional slip-ups, as evidenced by a recent… Continue Reading
[Update] November 13, 2023: New ‘Effluence’ Backdoor Targets Confluence Data Center and Server Upon Exploiting CVE-2023-22515 and CVE-2023-22518 [Update] October 12, 2023: See subheadings: "Storm-0062 APT Exploits Confluence Vulnerability (CVE-2023-22515)" & "Nuclei Template for CVE-2023-22515… Continue Reading
In the ever-evolving cybersecurity landscape, adding a vulnerability to CISA's Known Exploited Vulnerabilities Catalog stands as a significant alarm bell. Recently, a critical vulnerability affecting Mali GPU drivers caught CISA's attention, emphasizing the active exploitation… Continue Reading
In the ever-changing landscape of cybersecurity, staying updated with current vulnerabilities is crucial. The recent issues discovered in WS_FTP Server underscore this fact. In this article, we explore the details of these vulnerabilities, their possible… Continue Reading
[Update] September 29, 2023: See the subheading: “Proof-of-Concept Exploit Is Available for SharePoint Server Vulnerability (CVE-2023-29357).” In June 2023, Microsoft released a patch for a critical elevation of privilege vulnerability in SharePoint, identified as CVE-2023-29357.… Continue Reading
GitLab is a widely-used DevOps platform that allows for code hosting, continuous integration, and other collaborative features for both Community and Enterprise users. A new critical security release has just been rolled out for GitLab… Continue Reading
In the realm of digital communication and collaboration, Zimbra Collaboration Suite has been a trusted ally for many. However, a shadow has been cast over its security recently. A one-click security vulnerability, capable of granting… Continue Reading
Published on August 17, 2023, a significant security bulletin from Juniper Networks sheds light on a collection of vulnerabilities embedded in the J-Web component of Junos OS. While each vulnerability might seem innocuous with an… Continue Reading
[Update] August 25, 2023: See the subheadings: "Proof-of-Concept (PoC) Exploit Available for the Ivanti Sentry Zero-Day," and "CISA Warns for Active Exploitation of CVE-2023-38035." In the ever-evolving realm of cybersecurity, vulnerabilities continue to emerge, reminding… Continue Reading
In today’s connected world, efficient tools like the Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could be integral to businesses. But what happens when these… Continue Reading
In an age dominated by the digital, online platforms like LinkedIn have become vital components of our professional identities. But as we increasingly rely on these tools, concerns about their security inevitably rise. Recently, murmurs… Continue Reading
PaperCut NG and PaperCut MF are extensively utilized software solutions for print management servers. CVE-2023-39143 refers to path traversal vulnerabilities found in PaperCut NG and PaperCut MF versions released prior to v22.1.3. These vulnerabilities could… Continue Reading
In today's digital playground, social media swings both ways, offering a fun-filled space for individuals to connect and share, while also serving as a dynamic B2B carousel, where businesses can showcase their talents and build… Continue Reading
Virtual machines have revolutionized the world of cybersecurity, offering a myriad of benefits to cybersecurity professionals. They enable professionals to simulate real-world attack scenarios, conduct vulnerability testing, and analyze malware in a safe and controlled… Continue Reading
Recent revelations have exposed critical zero-day vulnerabilities in Atera Windows installers. Cyber attackers could potentially use these loopholes to launch privilege escalation attacks. To understand the severity of these vulnerabilities, it is crucial to unpack… Continue Reading
The cybersecurity threat landscape continues to witness new and sophisticated threats, and the banking sector is no exception. For the first time, the industry has been explicitly targeted by two distinct open-source software (OSS) supply… Continue Reading
In the realm of industrial control systems (ICS), vulnerabilities pose significant risks to critical infrastructure sectors worldwide. There are recently fixed critical severity vulnerabilities discovered in Schneider Electric's EcoStruxure Products, Modicon PLCs, and Programmable Automation… Continue Reading