
SOCRadar Recognized in the 2026 Gartner® Magic Quadrant™ for Cyberthre...
SOCRadar Recognized in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies SOCRadar is positioned as a Visionary in the inaugural Magic Quadrant report for Threat Intelligence,...

CVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KE...
CVE-2026-6973: Authenticated Admin RCE In Ivanti EPMM Added to CISA KEV Ivanti has patched CVE-2026-6973, a high-severity remote code execution (RCE) vulnerability affecting Ivanti Endpoint Manager Mo...

Operation HookedWing: 4-Year Multi-Sector Attack Analysis
Operation HookedWing: 4-Year Multi-Sector Phishing Campaign From 2022 to the present, a persistent phishing campaign that has not been publicly documented until now, referred to in this report as Oper...

CVE-2026-26956: vm2 Sandbox Escape Enables Host RCE in Node.js 25
CVE-2026-26956: vm2 Sandbox Escape Enables Host RCE in Node.js 25 CVE-2026-26956 is a critical sandbox escape affecting the Node.js sandbox library vm2. In vm2 3.10.4, attacker-controlled JavaScript e...

CVE-2026-23918: Apache HTTP Server HTTP/2 Double Free With Possible RC...
CVE-2026-23918: Apache HTTP Server HTTP/2 Double Free With Possible RCE CVE-2026-23918 is a vulnerability in Apache HTTP Server (httpd) that affects its HTTP/2 implementation and can lead to a double ...

CVE-2026-0300 Enables Root RCE in PAN-OS Captive Portal
CVE-2026-0300 Enables Root RCE in PAN-OS Captive Portal Palo Alto Networks disclosed CVE-2026-0300, a critical pre-authentication buffer overflow in the User-ID™ Authentication Portal (Captive Portal)...

Trellix Source Code Repository Incident: What Defenders Should Know
Trellix Source Code Repository Incident: What Defenders Should Know Trellix publicly disclosed that it identified unauthorized access to a portion of its internal source code repository. The company s...

ShinyHunters Breached Instructure: 275 Million Students, Teachers and ...
ShinyHunters Breached Instructure: 275 Million Students, Teachers and Staff Potentially Exposed If your school uses Canvas, your data may already be in the hands of one of the most active hacking grou...

CVE-2026-4670 & CVE-2026-5174: MOVEit Automation Flaws Enable Auth Byp...
CVE-2026-4670 & CVE-2026-5174: MOVEit Automation Flaws Enable Auth Bypass and Privilege Escalation Progress Software has disclosed and patched two vulnerabilities in MOVEit Automation, its managed...

Top 10 Ways Hackers Use AI for Cyber Attacks
Top 10 Ways Hackers Use AI for Cyber Attacks Artificial intelligence is reshaping every industry, including cybercrime. But unlike most professionals watching AI with caution, threat actors are welcom...

WhatsApp Number Leak, OpenVPN Access Sale, LiteLLM Exploit Scanner, BI...
WhatsApp Number Leak, OpenVPN Access Sale, LiteLLM Exploit Scanner, BIN Leads Listing, and PHI Buyer Post SOCRadar Dark Web Team identified several new underground posts, including a claim of 20.65 mi...

Top 10 AI Pentest Tools
Top 10 AI Pentest Tools AI pentest tools are gaining popularity in offensive security workflows. These tools accelerate reconnaissance and automate workflows, but at the same time, enable less skilled...

Top 10 Threat Intelligence Feeds for Enterprises
Top 10 Threat Intelligence Feeds for Enterprises Threat intelligence feeds help enterprises turn scattered threat data into security decisions. They can support alert enrichment, malware investigation...

March 2026: Wiper Attack Paralyzes Stryker as BPO Breaches & Data Thef...
March 2026: Wiper Attack Paralyzes Stryker as BPO Breaches & Data Thefts Sweep the Month March 2026 brought a heavy concentration of significant cyber incidents across healthcare, outsourcing, sof...

CVE-2026-31431: "Copy Fail," the Nine-Year-Old Linux Bug Introduced in...
CVE-2026-31431: “Copy Fail,” the Nine-Year-Old Linux Bug Introduced in 2017 A vulnerability hiding in plain sight for nearly a decade, capable of granting full root access to almost any Linux server w...

Chinese Cybercrime Infrastructure Detected: Automated Exploitation & H...
Chinese Cybercrime Infrastructure Detected: Automated Exploitation & Harvesting Infrastructure SOCRadar Threat Research Team identified automated Chinese cybercrime infrastructure that blends larg...

SAP Ecosystem Targeted: The Mini Shai-Hulud Supply Chain Attack
SAP Ecosystem Targeted: The Mini Shai-Hulud Supply Chain Attack A sophisticated npm supply-chain compromise dubbed “Mini Shai-Hulud” has recently emerged, creating an urgent risk for SAP CAP developme...

25 Best SOC Tools: AI-Powered & Automated Security Guide
25 Best SOC Tools: AI-Powered & Automated Security Guide Running a Security Operations Center (SOC) means drowning in tools, not lacking them. The harder problem is finding the right ones, deploye...

What Is Dark Web Monitoring?
What Is Dark Web Monitoring? Every day, stolen credentials, leaked records, and sensitive data show up in hidden corners of the internet. Most security tools never reach those places. Dark Web Monitor...

CVE-2026-3854 Exposes a Critical Weak Point in GitHub’s Git Push Pipel...
CVE-2026-3854 Exposes a Critical Weak Point in GitHub’s Git Push Pipeline A newly disclosed GitHub vulnerability, CVE-2026-3854, has drawn attention because it turned a routine git push operation into...
