
VMware Security Alert: Active Exploitation of Zero-Day Vulnerabilities...
VMware Security Alert: Active Exploitation of Zero-Day Vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) Virtualization technology is a backbone of modern enterprises, but it also p...

Dark Web Profile: Ghost (Cring) Ransomware
Dark Web Profile: Ghost (Cring) Ransomware In February 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-...

Top 10 Free Vulnerability Intelligence Platforms
Top 10 Free Vulnerability Intelligence Platforms Cyber threats emerge every day, and keeping up with vulnerabilities is a constant challenge for security teams. Having reliable vulnerability intellige...

Navigating the Evolving Cyber Threats in the Finance Industry
Navigating the Evolving Cyber Threats in the Finance Industry In the ever-evolving world of cybersecurity, staying ahead of emerging threats is crucial—especially for the financial sector. The Finance...

Kenya’s Cyber Threat Landscape: The Rising Risks and How to Stay Ahead...
Kenya’s Cyber Threat Landscape: The Rising Risks and How to Stay Ahead Kenya’s digital economy is thriving, but with this growth comes an alarming surge in cyber threats. Businesses, government instit...

Latest Dark Web Findings: Discord Credentials, Orange Customer Records...
Latest Dark Web Findings: Discord Credentials, Orange Customer Records, and Australian Bank Data Once again, hacker forums are filled with new cyber threats, with SOCRadar’s Dark Web Team identifying ...

Inside the Dark Web Economy: Key Insights from SOCRadar's Annual Dark ...
Inside the Dark Web Economy: Key Insights from SOCRadar’s Annual Dark Web Report 2024 With cyber threats evolving and growing more sophisticated every year, the dark web remains a key hotspot fo...

Phishing Links in Browsers: Identifying Red Flags and Staying Safe
Phishing Links in Browsers: Identifying Red Flags and Staying Safe According to the FBI’s Internet Crime Report, scams resulted in over $12 billion in losses in 2023 alone, demonstrating how this digi...

How to Secure Your Mobile Banking App Against Keyloggers
How to Secure Your Mobile Banking App Against Keyloggers Mobile banking has become an essential part of daily life, offering convenience at our fingertips. With just a few taps, we can check balances,...

The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for ...
The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations Artificial intelligence (AI) has long been heralded as a force for innovation, revolutionizing industries and red...

23 Billion Rows of Stolen Records: What You Need to Know?
23 Billion Rows of Stolen Records: What You Need to Know? Update: What Does the Alleged Leak Data Contain? Infostealer malware continues to pose a severe threat, with billions of stolen records circul...

Master Cybersecurity with Agentic AI: Exclusive Training on February 2...
Master Cybersecurity with Agentic AI: Exclusive Training on February 27, 2025! Cyber threats are advancing at an unprecedented pace, outpacing traditional security measures and demanding innovative so...

The Top 10 Dark Web Telegram Chat Groups and Channels
The Top 10 Dark Web Telegram Chat Groups and Channels Since the WhatsApp privacy policy controversy in January 2021, Telegram rapidly gained traction as a privacy-focused alternative, attracting users...

Security Alert: Critical Flaws in MITRE Caldera and Parallels Desktop ...
Security Alert: Critical Flaws in MITRE Caldera and Parallels Desktop (CVE-2025-27364, CVE-2024-34331) Two critical vulnerabilities, CVE-2025-27364 in MITRE Caldera and CVE-2024-34331 in Parallels Des...

Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, ...
Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, New Data Leak Claims Cybercriminal activity continues to escalate on hacker forums, with SOCRadar’s Dark Web Team identifying seve...

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025 In 2023, we compiled a list of the top free Cyber Threat Intelligence (CTI) sources to help security teams stay ahead of evolving t...

Black Basta’s Internal Chats Leak: Everything You Need to Know
Black Basta’s Internal Chats Leak: Everything You Need to Know (21.02.2025) Update: List of Domains in Leaked Chats (21.02.2025) Update: SOCRadar’s Intelligence Findings of Black Basta Leak, IoCs, TTP...

Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-O...
Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw (CVE-2025-0111) Joins CISA KEV Two major security flaws pose a serious exploitation risk for organizations using Micros...

Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CV...
Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global Attacks An ongoing cyber campaign targets unpatched Cisco IOS XE software used in telecommunications n...

Best Secure Browsers for 2025: A Comparison Guide
Best Secure Browsers for 2025: A Comparison Guide Your browser is your ship on the vast internet sea. It determines your safety first, followed by your speed and path. Choosing a secure browser is not...