Get Your Free Report
Start for Free
May 08, 2026
SOCRadar Recognized in the 2026 Gartner® Magic Quadrant™ for Cyberthre...

SOCRadar Recognized in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies SOCRadar is positioned as a Visionary in the inaugural Magic Quadrant report for Threat Intelligence,...

Learn More
May 08, 2026
CVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KE...

CVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KEV Ivanti has patched CVE-2026-6973, a high-severity remote code execution (RCE) vulnerability affecting Ivanti Endpoint Manager Mo...

Learn More
May 07, 2026
Operation HookedWing: 4-Year Multi-Sector Attack Analysis

Operation HookedWing: 4-Year Multi-Sector Phishing Campaign From 2022 to the present, a persistent phishing campaign that has not been publicly documented until now, referred to in this report as Oper...

Learn More
May 07, 2026
CVE-2026-26956: vm2 Sandbox Escape Enables Host RCE in Node.js 25

CVE-2026-26956: vm2 Sandbox Escape Enables Host RCE in Node.js 25 CVE-2026-26956 is a critical sandbox escape affecting the Node.js sandbox library vm2. In vm2 3.10.4, attacker-controlled JavaScript e...

Learn More
May 06, 2026
CVE-2026-23918: Apache HTTP Server HTTP/2 Double Free With Possible RC...

CVE-2026-23918: Apache HTTP Server HTTP/2 Double Free With Possible RCE CVE-2026-23918 is a vulnerability in Apache HTTP Server (httpd) that affects its HTTP/2 implementation and can lead to a double ...

Learn More
May 06, 2026
CVE-2026-0300 Enables Root RCE in PAN-OS Captive Portal

CVE-2026-0300 Enables Root RCE in PAN-OS Captive Portal Palo Alto Networks disclosed CVE-2026-0300, a critical pre-authentication buffer overflow in the User-ID™ Authentication Portal (Captive Portal)...

Learn More
May 05, 2026
Trellix Source Code Repository Incident: What Defenders Should Know

Trellix Source Code Repository Incident: What Defenders Should Know Trellix publicly disclosed that it identified unauthorized access to a portion of its internal source code repository. The company s...

Learn More
May 05, 2026
ShinyHunters Breached Instructure: 275 Million Students, Teachers and ...

ShinyHunters Breached Instructure: 275 Million Students, Teachers and Staff Potentially Exposed If your school uses Canvas, your data may already be in the hands of one of the most active hacking grou...

Learn More
May 05, 2026
CVE-2026-4670 & CVE-2026-5174: MOVEit Automation Flaws Enable Auth Byp...

CVE-2026-4670 & CVE-2026-5174: MOVEit Automation Flaws Enable Auth Bypass and Privilege Escalation Progress Software has disclosed and patched two vulnerabilities in MOVEit Automation, its managed...

Learn More
May 04, 2026
Top 10 Ways Hackers Use AI for Cyber Attacks

Top 10 Ways Hackers Use AI for Cyber Attacks Artificial intelligence is reshaping every industry, including cybercrime. But unlike most professionals watching AI with caution, threat actors are welcom...

Learn More
May 04, 2026
WhatsApp Number Leak, OpenVPN Access Sale, LiteLLM Exploit Scanner, BI...

WhatsApp Number Leak, OpenVPN Access Sale, LiteLLM Exploit Scanner, BIN Leads Listing, and PHI Buyer Post SOCRadar Dark Web Team identified several new underground posts, including a claim of 20.65 mi...

Learn More
May 04, 2026
Top 10 AI Pentest Tools

Top 10 AI Pentest Tools AI pentest tools are gaining popularity in offensive security workflows. These tools accelerate reconnaissance and automate workflows, but at the same time, enable less skilled...

Learn More
May 01, 2026
Top 10 Threat Intelligence Feeds for Enterprises

Top 10 Threat Intelligence Feeds for Enterprises Threat intelligence feeds help enterprises turn scattered threat data into security decisions. They can support alert enrichment, malware investigation...

Learn More
Apr 30, 2026
March 2026: Wiper Attack Paralyzes Stryker as BPO Breaches & Data Thef...

March 2026: Wiper Attack Paralyzes Stryker as BPO Breaches & Data Thefts Sweep the Month March 2026 brought a heavy concentration of significant cyber incidents across healthcare, outsourcing, sof...

Learn More
Apr 30, 2026
CVE-2026-31431: "Copy Fail," the Nine-Year-Old Linux Bug Introduced in...

CVE-2026-31431: “Copy Fail,” the Nine-Year-Old Linux Bug Introduced in 2017 A vulnerability hiding in plain sight for nearly a decade, capable of granting full root access to almost any Linux server w...

Learn More
Apr 30, 2026
Chinese Cybercrime Infrastructure Detected: Automated Exploitation & H...

Chinese Cybercrime Infrastructure Detected: Automated Exploitation & Harvesting Infrastructure SOCRadar Threat Research Team identified automated Chinese cybercrime infrastructure that blends larg...

Learn More
Apr 30, 2026
SAP Ecosystem Targeted: The Mini Shai-Hulud Supply Chain Attack

SAP Ecosystem Targeted: The Mini Shai-Hulud Supply Chain Attack A sophisticated npm supply-chain compromise dubbed “Mini Shai-Hulud” has recently emerged, creating an urgent risk for SAP CAP developme...

Learn More
Apr 29, 2026
25 Best SOC Tools: AI-Powered & Automated Security Guide

25 Best SOC Tools: AI-Powered & Automated Security Guide Running a Security Operations Center (SOC) means drowning in tools, not lacking them. The harder problem is finding the right ones, deploye...

Learn More
Apr 29, 2026
What Is Dark Web Monitoring?

What Is Dark Web Monitoring? Every day, stolen credentials, leaked records, and sensitive data show up in hidden corners of the internet. Most security tools never reach those places. Dark Web Monitor...

Learn More
Apr 29, 2026
CVE-2026-3854 Exposes a Critical Weak Point in GitHub’s Git Push Pipel...

CVE-2026-3854 Exposes a Critical Weak Point in GitHub’s Git Push Pipeline A newly disclosed GitHub vulnerability, CVE-2026-3854, has drawn attention because it turned a routine git push operation into...

Learn More