Get Your Free Report
Start for Free
Apr 17, 2026
Nmap Commands Guide: Cheat Sheet & Reference

Nmap Commands Guide: Cheat Sheet & Reference Nmap (Network Mapper) is a free, OSINT tool used to discover devices and services on a network. Security professionals, system administrators, and ethi...

Learn More
Apr 17, 2026
Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next

Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next Since the Iran War began on February 28, 2026, the conflict has moved through phases that most threat frameworks were not built to tr...

Learn More
Apr 17, 2026
BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exp...

BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exploited in the Wild Three Windows Defender vulnerabilities disclosed as zero-days in April 2026 are now being actively exploited: B...

Learn More
Apr 16, 2026
Void Stealer: The Infostealer Malware Quietly Targeting Organizations ...

Void Stealer: The Infostealer Malware Quietly Targeting Organizations in 2026 Void Stealer is an infostealer malware that emerged in late 2025 and has been running active campaigns against users and o...

Learn More
Apr 15, 2026
April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including...

April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including One Actively Exploited Microsoft released its April 2026 Patch Tuesday security updates, resolving a total of 165 vulnerabilities...

Learn More
Apr 15, 2026
AI Across the Attack Chain From Recon to Execution

AI Across the Attack Chain From Recon to Execution Artificial intelligence has moved from a supporting tool to an active component in cyber operations. Earlier use cases were limited to analysis and c...

Learn More
Apr 14, 2026
Top 10 Free Threat Intelligence Tools for MSSPs

Top 10 Free Threat Intelligence Tools for MSSPs Threat intelligence helps Managed Security Service Providers (MSSPs) move faster, prioritize better, and give clients clearer answers when new risks app...

Learn More
Apr 14, 2026
Deep Web vs Dark Web: What’s the Real Difference?

Deep Web vs Dark Web: What’s the Difference? The deep web includes private parts of the internet that are not indexed by search engines and usually require standard browser access with credentials. Th...

Learn More
Apr 14, 2026
CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticate...

CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticated RCE Path Apache Tomcat users running Tribes clustering should pay attention to CVE-2026-34486, an important-severity regression ...

Learn More
Apr 13, 2026
Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Gov...

Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Government Breach A cyberattack spanning nine Mexican government organizations has become one of the clearest examples yet of how...

Learn More
Apr 13, 2026
Alleged Police Tipline Data Sale, iOS and Adobe Exploits, RDWeb Access...

Alleged Police Tipline Data Sale, iOS and Adobe Exploits, RDWeb Access Listings, and Gunra Recruitment SOCRadar’s Dark Web Team identified several new underground posts this week, including an alleged...

Learn More
Apr 13, 2026
CVE-2026-34621: Adobe Acrobat Reader Zero-Day Enables Arbitrary Code E...

CVE-2026-34621: Adobe Acrobat Reader Zero-Day Enables Arbitrary Code Execution via Crafted PDF Adobe released an emergency update for Adobe Acrobat and Adobe Acrobat Reader on Windows and macOS to add...

Learn More
Apr 13, 2026
Could XChat Become a Telegram Rival and a Future Hub for Threat Actors...

Could XChat Become a Telegram Rival and a Future Hub for Threat Actors? X’s upcoming messaging app, XChat, is being presented as more than a simple upgrade to direct messages. Public details point to ...

Learn More
Apr 10, 2026
How Phishing Kits Targeting U.S. Giants Are Built, Sold, and Deployed

How Phishing Kits Targeting U.S. Giants Are Built, Sold, and Deployed Modern phishing kits can steal authenticated sessions from Microsoft 365 and Google accounts in real time, even when MFA is enable...

Learn More
Apr 09, 2026
Dark Web Profile: TeamPCP

Dark Web Profile: TeamPCP TeamPCP is a financially motivated cybercriminal group that executed the most consequential open-source supply chain attack campaign of 2026, compromising security tools trus...

Learn More
Apr 09, 2026
Claude Mythos Preview Signals a New Phase for AI in Vulnerability Rese...

Claude Mythos Preview Signals a New Phase for AI in Vulnerability Research Anthropic’s Claude Mythos Preview is drawing attention because it showed a much stronger ability to find and exploit software...

Learn More
Apr 07, 2026
FBI IC3 2025 Internet Crime Report: 10 Important Takeaways

FBI IC3 2025 Internet Crime Report: 10 Important Takeaways The FBI’s Internet Crime Complaint Center (IC3) has just released its 2025 Annual Report, and it’s a record-breaker in the worst way. For the...

Learn More
Apr 07, 2026
The Unknown Stealers: What's Hidden Below the Radar

The Unknown Stealers: What’s Hidden Below the Radar The stealer ecosystem has matured into a professionalized criminal economy that most organizations are simply not monitoring closely enough. W...

Learn More
Apr 07, 2026
BlueHammer Windows Zero-Day: Privilege Escalation Risk

BlueHammer Windows Zero-Day: Privilege Escalation Risk A newly exposed Windows zero-day known as BlueHammer has become a serious concern because it can let an attacker move from a limited user account...

Learn More
Apr 06, 2026
Alleged TrakCare Access, PowerLab Leak, U.S. Driver IDs, Hong Kong HA ...

Alleged TrakCare Access, PowerLab Leak, U.S. Driver IDs, Hong Kong HA Data and More SOCRadar’s Dark Web Team identified several new underground posts this week, including an alleged unauthorized acces...

Learn More