RomCom Backdoor Attacks Use Zero-Day Exploits in Mozilla and Windows (...
RomCom Backdoor Attacks Use Zero-Day Exploits in Mozilla and Windows (CVE-2024-9680 & CVE-2024-49039) Recent research has revealed how the RomCom cyber threat group exploited two zero-day vulnerab...
How to Overcome Dark Web Risks in Your Industry - CISO Edition
How to Overcome Dark Web Risks in Your Industry – CISO Edition The dark web has evolved into a vast and thriving marketplace for stolen data, illicit services, and cybercrime tools. For Chief Informat...
Why is SOCRadar the Preferred Choice for CISOs?
Why is SOCRadar the Preferred Choice for CISOs? Chief Information Security Officers (CISOs) are under constant pressure to safeguard their organizations against sophisticated threats while maximizing ...
Critical QNAP Vulnerabilities in Notes Station 3 and QuRouter Demand I...
Critical QNAP Vulnerabilities in Notes Station 3 and QuRouter Demand Immediate Patching (CVE-2024-38645, CVE-2024-38643, CVE-2024-48860) QNAP recently released multiple security advisories addressing ...
Perfctl Campaign Exploits Millions of Linux Servers for Crypto Mining ...
Perfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjacking Linux servers, the backbone of countless organizations worldwide, have recently come under siege by a stealthy an...
Top 10 Security Tips for Online Shopping (Black Friday Edition)
Top 10 Security Tips for Online Shopping (Black Friday Edition) Black Friday and Cyber Monday are two of the year’s most anticipated shopping events, and cybercriminals know this all too well. After a...
Tesla Charging Stations, Banque de France, and NOQ Group Targeted on D...
Tesla Charging Stations, Banque de France, and NOQ Group Targeted on Dark Web SOCRadar’s Dark Web Team has highlighted a range of concerning cyber threats since last week. Among these are the launch o...
Dark Web Profile: Moonstone Sleet
Dark Web Profile: Moonstone Sleet Moonstone Sleet AKA Storm-1789, a newly identified North Korean Advanced Persistent Threat (APT) group, has been making waves with its targeted cyberattacks that blen...
NodeStealer’s Evolution: A Growing Threat to Facebook Accounts and Bey...
NodeStealer’s Evolution: A Growing Threat to Facebook Accounts and Beyond NodeStealer, a Python-based infostealer, has resurfaced in a more dangerous form, raising the stakes for global cybersecurity ...
Financial Software Company Finastra Investigates Recent Security Incid...
Financial Software Company Finastra Investigates Recent Security Incident Finastra, a prominent financial services software provider, is currently investigating a cybersecurity incident that has raise...
Hackers Don't Hack, They Log In – Stealer Logs and Identity Attacks
Hackers Don’t Hack, They Log In – Stealer Logs and Identity Attacks Cyber threat actors are moving beyond traditional methods like exploiting vulnerabilities or brute-forcing passwords. Instead, they ...
Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Sys...
Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws Recent findings have exposed high-severity flaws in the needrestart utility, a key component ...
Apple, Oracle, and Apache Issue Critical Updates for Actively Exploite...
Apple, Oracle, and Apache Issue Critical Updates for Actively Exploited and High-Risk Vulnerabilities Organizations using Apple, Oracle, and Apache software must act quickly as critical security flaws...
Top 10 Metrics Every CISO Should Track for Better Security
Top 10 Metrics Every CISO Should Track for Better Security Chief Information Security Officers (CISOs) must navigate a wide range of threats and vulnerabilities in order to effectively protect their o...
Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0...
Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0012 and CVE-2024-9474) [Update] November 22, 2024: “Growing Exploitation of Palo Alto Networks PAN-OS Vulnerabilities” Palo Alto ...
How Stealer Logs Target E-Commerce Giants During Black Friday
How Stealer Logs Target E-Commerce Giants During Black Friday As the holiday season approaches, Black Friday stands out as one of the busiest shopping days of the year. For consumers, it’s an opportun...
Asia Hacktivist Threat Landscape
Asia Hacktivist Threat Landscape Hacktivism blurs the lines between digital rebellion and activism, as threat actors act for their social and political causes. Far from the traditional protest, hackti...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of F...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of France Targeted Recently, SOCRadar’s Dark Web Team has identified an alleged data breach at Ford Motor Company that exposed 44,000 ...
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insi...
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights Today, when the world is increasingly moving towards digital operation, stolen data circulating on the Dark Web has been a ni...
Dark Web Profile: Cadet Blizzard
Dark Web Profile: Cadet Blizzard Cadet Blizzard (DEV-0586) is a Russian GRU-affiliated cyber threat group first tracked by Microsoft in early 2022, following a series of disruptive cyberattacks on Ukr...