Latest articles from SOCRadar
Welcome to this week's Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the depths of the hidden online realm. Our SOCRadar Dark Web Team has been busy digging… Continue Reading
In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with online threats. So, what is it? Vulnerability intelligence focuses on gathering and sharing information about software vulnerabilities. Its main… Continue Reading
The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting an updated version of the 2.3.0 (2.3.0.1 since August 15, 2023) malware to potential cybercriminals.… Continue Reading
In today's rapidly evolving digital landscape, the term "cybersecurity" has become synonymous with safeguarding our most valuable assets: information and data. As we continue to witness an increasing number of cyber threats and attacks, ranging… Continue Reading
[Update] November 9, 2023: “End of an Era, the Sinking of Ransomed.VC” [Update] October 5, 2023: See the subheading: “RansomedVC De-anonymized Itself After Moving to WordPress.” [Update] October 2, 2023: See the subheadings: “RansomedVC Partners… Continue Reading
In the ever-evolving landscape of cyber threats, understanding the profiles of individual threat actors is crucial for both governments and private organizations to take action before major incidents happen. One such actor that has recently… Continue Reading
The design of the Paris 2024 Olympic and Paralympic torch, introduced on July 25, 2023, struck the first gong for The Paris 2024 Summer Olympic and Paralympic Games. With less than one year remaining until… Continue Reading
Two critical vulnerabilities, collectively identified as CVE-2023-32560, have been discovered within Ivanti Avalanche, an enterprise mobility management (EMM) solution responsible for managing, monitoring, and securing various mobile devices. The flaws have been classified as critical… Continue Reading
Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In this blog post, we delve into Dark Web search engines. Hidden from the prying eyes of mainstream search giants, these enigmatic… Continue Reading
The SOCRadar Dark Web Team continuously uncovers incidents that endanger various entities by monitoring the hidden recesses of the internet. In this blog post, we explore five recent findings: A sale for blackhat tool Evil-GPT… Continue Reading
The SOCRadar Dark Web Team has been tirelessly monitoring the deep corners of the internet, and their efforts have unearthed several incidents that put various entities at risk. In this blog post, we will explore… Continue Reading
Microsoft fixed a critical vulnerability in its Power Platform after facing criticism for the delayed response. Tenable reported the vulnerability to Microsoft on March 30, 2023, and an official fix was issued in August. The… Continue Reading
Researchers have uncovered a highly effective phishing tactic, which utilizes Google AMP (Accelerated Mobile Pages). Google AMP is an open-source HTML framework designed to create websites optimized for mobile browsers. In this recent campaign, the… Continue Reading
What is LOTL Attack? Living Off the Land (LOTL), also known as lolbins, is a sophisticated cyberattack technique that leverages legitimate tools already present within a victim's system to execute and sustain an attack. Contrary… Continue Reading
The major cyberattacks of July 2023 included waves of data breaches, affecting both private and public sector entities, including healthcare organizations, financial institutions, and government agencies. However, the most attention-grabbing incident of the month was… Continue Reading
Welcome to the twisted world of the Dark Web, where the illicit trade of cyber weapons and stolen data thrives under the cover of anonymity. In this blog post, we will explore some of the… Continue Reading
Maddie Stone of Google’s Threat Analysis Group (TAG) authored the fourth annual year-in-review of zero-day vulnerabilities that attackers exploited in the wild. The report builds upon the mid-year 2022 review. In the course of 2022,… Continue Reading
In today's cyber world, while the ransomware scene remains dynamic and active, new actors are emerging with significant numbers of victims. In this article, we will focus on 8Base Ransomware, which ranked in the top… Continue Reading
Researchers have uncovered a new initial access malware campaign dubbed “Nitrogen”. This campaign employs Google and Bing search ads to promote fake software sites. The primary objective of the Nitrogen malware is to provide threat… Continue Reading
In cyberspace, the Korean Peninsula has been a hotbed of activity for a while. With conflict unfolding between North and South Korea, North Korean Advanced Persistent Threats (APTs) are emerging as the weapon of choice.… Continue Reading