Nmap Commands Guide: Cheat Sheet & Reference
Nmap Commands Guide: Cheat Sheet & Reference Nmap (Network Mapper) is a free, OSINT tool used to discover devices and services on a network. Security professionals, system administrators, and ethi...
Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next
Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next Since the Iran War began on February 28, 2026, the conflict has moved through phases that most threat frameworks were not built to tr...
BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exp...
BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exploited in the Wild Three Windows Defender vulnerabilities disclosed as zero-days in April 2026 are now being actively exploited: B...
Void Stealer: The Infostealer Malware Quietly Targeting Organizations ...
Void Stealer: The Infostealer Malware Quietly Targeting Organizations in 2026 Void Stealer is an infostealer malware that emerged in late 2025 and has been running active campaigns against users and o...
April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including...
April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including One Actively Exploited Microsoft released its April 2026 Patch Tuesday security updates, resolving a total of 165 vulnerabilities...
AI Across the Attack Chain From Recon to Execution
AI Across the Attack Chain From Recon to Execution Artificial intelligence has moved from a supporting tool to an active component in cyber operations. Earlier use cases were limited to analysis and c...
Top 10 Free Threat Intelligence Tools for MSSPs
Top 10 Free Threat Intelligence Tools for MSSPs Threat intelligence helps Managed Security Service Providers (MSSPs) move faster, prioritize better, and give clients clearer answers when new risks app...
Deep Web vs Dark Web: What’s the Real Difference?
Deep Web vs Dark Web: What’s the Difference? The deep web includes private parts of the internet that are not indexed by search engines and usually require standard browser access with credentials. Th...
CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticate...
CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticated RCE Path Apache Tomcat users running Tribes clustering should pay attention to CVE-2026-34486, an important-severity regression ...
Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Gov...
Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Government Breach A cyberattack spanning nine Mexican government organizations has become one of the clearest examples yet of how...
Alleged Police Tipline Data Sale, iOS and Adobe Exploits, RDWeb Access...
Alleged Police Tipline Data Sale, iOS and Adobe Exploits, RDWeb Access Listings, and Gunra Recruitment SOCRadar’s Dark Web Team identified several new underground posts this week, including an alleged...
CVE-2026-34621: Adobe Acrobat Reader Zero-Day Enables Arbitrary Code E...
CVE-2026-34621: Adobe Acrobat Reader Zero-Day Enables Arbitrary Code Execution via Crafted PDF Adobe released an emergency update for Adobe Acrobat and Adobe Acrobat Reader on Windows and macOS to add...
Could XChat Become a Telegram Rival and a Future Hub for Threat Actors...
Could XChat Become a Telegram Rival and a Future Hub for Threat Actors? X’s upcoming messaging app, XChat, is being presented as more than a simple upgrade to direct messages. Public details point to ...
How Phishing Kits Targeting U.S. Giants Are Built, Sold, and Deployed
How Phishing Kits Targeting U.S. Giants Are Built, Sold, and Deployed Modern phishing kits can steal authenticated sessions from Microsoft 365 and Google accounts in real time, even when MFA is enable...
Dark Web Profile: TeamPCP
Dark Web Profile: TeamPCP TeamPCP is a financially motivated cybercriminal group that executed the most consequential open-source supply chain attack campaign of 2026, compromising security tools trus...
Claude Mythos Preview Signals a New Phase for AI in Vulnerability Rese...
Claude Mythos Preview Signals a New Phase for AI in Vulnerability Research Anthropic’s Claude Mythos Preview is drawing attention because it showed a much stronger ability to find and exploit software...
FBI IC3 2025 Internet Crime Report: 10 Important Takeaways
FBI IC3 2025 Internet Crime Report: 10 Important Takeaways The FBI’s Internet Crime Complaint Center (IC3) has just released its 2025 Annual Report, and it’s a record-breaker in the worst way. For the...
The Unknown Stealers: What's Hidden Below the Radar
The Unknown Stealers: What’s Hidden Below the Radar The stealer ecosystem has matured into a professionalized criminal economy that most organizations are simply not monitoring closely enough. W...
BlueHammer Windows Zero-Day: Privilege Escalation Risk
BlueHammer Windows Zero-Day: Privilege Escalation Risk A newly exposed Windows zero-day known as BlueHammer has become a serious concern because it can let an attacker move from a limited user account...
Alleged TrakCare Access, PowerLab Leak, U.S. Driver IDs, Hong Kong HA ...
Alleged TrakCare Access, PowerLab Leak, U.S. Driver IDs, Hong Kong HA Data and More SOCRadar’s Dark Web Team identified several new underground posts this week, including an alleged unauthorized acces...