Feb 23, 2024
Top 10 Deep Web and Dark Web Forums

Top 10 Deep Web and Dark Web Forums The dark web hosts a myriad of forums that operate beyond the reach of conventional internet users, serving as epicenters for cybercriminal activities. These forums...

Learn More
Feb 23, 2024
Dark Peep #11: The Final Curtain for LockBit Ransomware (Operation Cro...

Dark Peep #11: The Final Curtain for LockBit Ransomware (Operation Cronos) Digital Olympians and seekers of cyber lore! “Dark Peep #11” unfurls its scroll to reveal tales of cunning, courage, an...

Learn More
Feb 22, 2024
Shadow Ops Exposed: Inside the Leak of China's i-Soon Cyber Espionage ...

Shadow Ops Exposed: Inside the Leak of China’s i-Soon Cyber Espionage Empire Chinese authorities, law enforcement agencies, cybersecurity researchers, and a whole lot of other people are investi...

Learn More
Feb 21, 2024
Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC...

Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP (CVE-2024-1709, CVE-2024-1597, CVE-2024-22245) [Update] February 23, 2024: “ScreenConnect Instances Targeted to D...

Learn More
Feb 21, 2024
Using Jupyter Notebook for CTI using PyMISP

Using Jupyter Notebook for CTI using PyMISP In Cyber Threat Intelligence (CTI), Jupyter Notebook and PyMISP are transformative tools. Just as Bash commands empower defenders, these platforms offer dyn...

Learn More
Feb 21, 2024
Weekly Vulnerability Summary by CISA – February 12, 2024; New ICS Advi...

Weekly Vulnerability Summary by CISA – February 12, 2024; New ICS Advisories The Cybersecurity and Infrastructure Security Agency (CISA) has once again issued a summary of the latest vulnerabilities. ...

Learn More
Feb 21, 2024
Power of AI: Dark Web Monitoring with ChatGPT

Power of AI: Dark Web Monitoring with ChatGPT The dark web, often shrouded in mystery and intrigue, is a part of the internet that remains hidden from conventional search engines and browsers. It̵...

Learn More
Feb 20, 2024
Multiple Zero-Day and RCE Vulnerabilities Aboard: AutoCAD, SolarWinds ...

Multiple Zero-Day and RCE Vulnerabilities Aboard: AutoCAD, SolarWinds ARM, Bricks Builder Under Risk The Zero Day Initiative (ZDI) has reported several vulnerabilities affecting Autodesk AutoCAD; thes...

Learn More
Feb 20, 2024
Dark Web Profile: Hunters International

Dark Web Profile: Hunters International Originating in the latter part of 2023, this Ransomware-as-a-Service (RaaS) operation has drawn attention due to its technical lineage and operational tactics r...

Learn More
Feb 20, 2024
International Authorities Strike Blow Against LockBit Ransomware: Oper...

International Authorities Strike Blow Against LockBit Ransomware: Operation Cronos [Update] February 23, 2024: “Who is LockBitSupp?”, “Attempt for LockBit 4.0”, “Alleged LockBit Activity” [Update] Feb...

Learn More
Feb 19, 2024
Sales of bfBot Stealer & Knight Ransomware Source Code, Dior Vulnerabi...

Sales of bfBot Stealer & Knight Ransomware Source Code, Dior Vulnerabilities, Passport Leaks, and More The SOCRadar Dark Web Team exposed alarming sales, from ransomware source codes to leaked pas...

Learn More
Feb 19, 2024
Importance of Indicators of Compromise (IoCs) in CTI for Actionable In...

Importance of Indicators of Compromise (IoCs) in CTI for Actionable Intelligence Whether in the case of a targeted attack or random mass exploitation, using Indicators of Compromise (IoCs) is a crucia...

Learn More
Feb 16, 2024
Threat Actor Profile: ScarCruft / APT37

Threat Actor Profile: ScarCruft / APT37 ScarCruft, also widely known as APT37 or Reaper APT, is an espionage group associated with North Korean state activities that target high-value individuals. The...

Learn More
Feb 16, 2024
Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields ...

Fortifying the Digital Frontier: Australia’s Pioneering Cyber Shields Strategy In 2022, Following the Medibank breach in November, Australia’s Cyber Security Minister Clare O’Neil hi...

Learn More
Feb 15, 2024
Sensitive Information Belonging to BMW Exposed Due to Misconfigured Cl...

Sensitive Information Belonging to BMW Exposed Due to Misconfigured Cloud Bucket A recent event involving a misconfigured cloud storage bucket owned by BMW has highlighted the crucial role of cloud se...

Learn More
Feb 15, 2024
CISA Highlights Critical Adobe Security Updates for Acrobat, Magento, ...

CISA Highlights Critical Adobe Security Updates for Acrobat, Magento, and More (CVE-2024-20738, CVE-2024-20719, CVE-2024-20720) In a recent alert, CISA highlighted Adobe’s release of security up...

Learn More
Feb 14, 2024
Zoom Addressed Seven Vulnerabilities Across Windows, iOS, and Android,...

Zoom Addressed Seven Vulnerabilities Across Windows, iOS, and Android, Including One Critical (CVE-2024-24691) Zoom, the well-known video conferencing platform, patched 7 security vulnerabilities in a...

Learn More
Feb 14, 2024
Pipeline to Peril: Unpacking the ALPHV Attack on Trans-Northern

Pipeline to Peril: Unpacking the ALPHV Attack on Trans-Northern [Update] February 16, 2024: “US State Department’s Reward for Information on ALPHV/BlackCat Ransomware” In the ever-evolving lands...

Learn More
Feb 14, 2024
Microsoft’s February 2024 Patch Tuesday Highlights: CVE-2024-21412 and...

Microsoft’s February 2024 Patch Tuesday Highlights: CVE-2024-21412 and CVE-2024-21351 Under Exploitation [Update] February 20, 2024: “Potential Targets for CVE-2024-21410” [Update] February 19, 2024: ...

Learn More
Feb 14, 2024
Top Linux Bash Commands that SOC Analysts Should Know

Top Linux Bash Commands that SOC Analysts Should Know Within the domain of Cyber Threat Intelligence (CTI), where various tools and processes are deployed for vigilant defense, Bash commands are one s...

Learn More