
UNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE ...
UNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE & BRUSHFIRE Malware A recently disclosed critical vulnerability in Ivanti products, CVE-2025-22457, has drawn urgent attention...

Everything You Need to Know About the Alleged Twilio SendGrid Breach
Everything You Need to Know About the Alleged Twilio SendGrid Breach On April 3, 2025, a threat actor operating under the alias Satanic announced on BreachForums that they were in possession of a sign...

The Blogspot Based Phishing Attacks
The Blogpost Based Phishing Attacks Recently, the increase in Blogspot-based phishing sites has drawn attention. Threat actors are taking advantage of Blogspot’s free and seemingly reliable infrastruc...

Top 10 Dark Web Monitoring Tools
Top 10 Dark Web Monitoring Tools Imagine a place on the internet where rules don’t exist, identities are masked, and secrets are currency. Welcome to the dark web—a digital underworld where cybercrimi...

CrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): Wha...
CrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): What You Need to Know A newly discovered flaw in the CrushFTP file transfer platform is under active exploitation, with threat actors...

Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany
Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany This week, SOCRadar’s Dark Web Team uncovered several notable cyber threats circulating on hacker forums. Among the key findings are a...

Alleged Check Point Breach: What Happened and What You Need to Know?
Alleged Check Point Breach: What Happened and What You Need to Know? [Update] April 2, 2025: “Latest Developments: Dissecting CoreInjection’s Claims and the Alleged Leak” On March 31, 2025, a threat a...

Major Cyber Attacks Targeting Transportation & Logistics Industry
Major Cyber Attacks Targeting Transportation & Logistics Industry The global transportation and logistics industry is the backbone of modern commerce, enabling the smooth flow of goods and service...

Mozilla Responds to Critical Vulnerability: Urgent Firefox Update
Mozilla Responds to Critical Vulnerability: Urgent Firefox Update In a rapid response to a similar vulnerability with Google Chrome, Mozilla has issued an update for its Firefox browser on Windows to ...

Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharg...
Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharge Pentesting & Red Teaming In 2024, cybersecurity threats surged to unprecedented levels, with the average cost of a data brea...

Top 10 Dark Web Search Engines in 2025
Top 10 Dark Web Search Engines in 2025 A lot has changed since we last covered the top 5 Dark Web search engines. Some search engines are still around, while others have shut down or become unreliable...

NATO's Digital Frontiers Threat Landscape Report
NATO’s Digital Frontiers Threat Landscape Report In today’s interconnected world, the security of nations extends far beyond physical borders. The cyber domain has emerged as a critical ba...

Ingress Nightmare: Critical Unauthenticated Remote Code Execution Vuln...
Ingress Nightmare: Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress NGINX On March 24, 2025, the Kubernetes Security Response Committee released a patch for a set of high to c...

Everything You Need to Know About Oracle Cloud Security Incident by ro...
Everything You Need to Know About Oracle Cloud Security Incident by rose87168 [Update] April 2, 2025: “What are the Recent Developments?” rose87168 is the alias of a hacker who claims to have breached...

Arkana Ransomware Attack on WideOpenWest: What You Need to Know
Arkana Ransomware Attack on WideOpenWest: What You Need to Know A previously unknown threat actor has launched its first ransomware attack, marking a worrisome new chapter in the cyber threat landscap...

Dark Web Market: Russian Market
Dark Web Market: Russian Market Russian Market or Russian Markat is a Dark Web Market (DWM) that emerged in 2019, specializing in the sale of stolen data, including credentials, financial information,...

Next.js Middleware Vulnerability (CVE-2025-29927): What You Need to Kn...
Next.js Middleware Vulnerability (CVE-2025-29927): What You Need to Know and How to Respond A critical security flaw has recently shaken the Next.js ecosystem, bringing urgent attention to the framewo...

Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and ...
Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik Data Leak This week, SOCRadar’s Dark Web Team uncovered a series of high-risk activities surfacing on hacker forums. Key fin...

Critical Veeam Vulnerability (CVE-2025-23120) Enables Remote Code Exec...
Critical Veeam Vulnerability (CVE-2025-23120) Enables Remote Code Execution by Domain Users A newly discovered vulnerability in Veeam Backup & Replication, tracked as CVE-2025-23120, has emerged a...

Dark Web Profile: FSociety (Flocker) Ransomware
Dark Web Profile: FSociety (Flocker) Ransomware FSociety or Flocker ransomware, discovered in 2024, is a relatively new strain operating as Ransomware-as-a-Service (RaaS), enabling cybercriminals to e...