Get Your Free Report
Start for Free
Apr 21, 2026
CVE-2026-38526 in Krayin CRM Enables RCE

CVE-2026-38526 in Krayin CRM Enables RCE CVE-2026-38526 is a critical authenticated remote code execution (RCE) vulnerability affecting Webkul Krayin CRM / Krayin Laravel CRM v2.2.x. The issue is in t...

Learn More
Apr 21, 2026
Maritime OSINT: Tracking Dark Ships & Shadow Fleets

Maritime OSINT: Tracking Dark Ships & Shadow Fleets Every day, thousands of oil tankers move through the world’s oceans. Most of them broadcast their position, their name, and their destination to...

Learn More
Apr 20, 2026
Vercel Breach: Hacker Claims to Sell Stolen Data in Potential Global S...

Vercel Breach: Hacker Claims to Sell Stolen Data in Potential Global Supply Chain Attack On April 19, 2026, Vercel, the cloud development platform behind Next.js and Turbopack, disclosed a security in...

Learn More
Apr 20, 2026
Vercel and Binance Data Claims, Israel Facebook Leak, FALKONc2 Sale, a...

Vercel and Binance Data Claims, Israel Facebook Leak, FALKONc2 Sale, and Gmail Caller Recruitment SOCRadar Dark Web Team identified several new underground posts, including an alleged Vercel access ke...

Learn More
Apr 20, 2026
Public Elasticsearch Servers Expose 9.8 Billion Credential Records Acr...

Public Elasticsearch Servers Expose 9.8 Billion Credential Records Across Enterprise, Cloud, and AI Platforms Misconfigured Elasticsearch servers continue to expose massive volumes of sensitive data. ...

Learn More
Apr 17, 2026
Nmap Commands Guide: Cheat Sheet & Reference

Nmap Commands Guide: Cheat Sheet & Reference Nmap (Network Mapper) is a free, OSINT tool used to discover devices and services on a network. Security professionals, system administrators, and ethi...

Learn More
Apr 17, 2026
Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next

Iran War Cyber Threat Outlook: Conflict Phases and What Comes Next Since the Iran War began on February 28, 2026, the conflict has moved through phases that most threat frameworks were not built to tr...

Learn More
Apr 17, 2026
BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exp...

BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exploited in the Wild Three Windows Defender vulnerabilities disclosed as zero-days in April 2026 are now being actively exploited: B...

Learn More
Apr 16, 2026
Void Stealer: The Infostealer Malware Quietly Targeting Organizations ...

Void Stealer: The Infostealer Malware Quietly Targeting Organizations in 2026 Void Stealer is an infostealer malware that emerged in late 2025 and has been running active campaigns against users and o...

Learn More
Apr 15, 2026
April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including...

April 2026 Patch Tuesday: 165 Vulnerabilities, Two Zero-Days Including One Actively Exploited Microsoft released its April 2026 Patch Tuesday security updates, resolving a total of 165 vulnerabilities...

Learn More
Apr 15, 2026
AI Across the Attack Chain From Recon to Execution

AI Across the Attack Chain From Recon to Execution Artificial intelligence has moved from a supporting tool to an active component in cyber operations. Earlier use cases were limited to analysis and c...

Learn More
Apr 14, 2026
Top 10 Free Threat Intelligence Tools for MSSPs

Top 10 Free Threat Intelligence Tools for MSSPs Threat intelligence helps Managed Security Service Providers (MSSPs) move faster, prioritize better, and give clients clearer answers when new risks app...

Learn More
Apr 14, 2026
Deep Web vs Dark Web: What’s the Real Difference?

Deep Web vs Dark Web: What’s the Difference? The deep web includes private parts of the internet that are not indexed by search engines and usually require standard browser access with credentials. Th...

Learn More
Apr 14, 2026
CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticate...

CVE-2026-34486: Apache Tomcat Tribes Regression Creates Unauthenticated RCE Path Apache Tomcat users running Tribes clustering should pay attention to CVE-2026-34486, an important-severity regression ...

Learn More
Apr 13, 2026
Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Gov...

Claude Code & ChatGPT Used to Steal Millions of Records in Mexican Government Breach A cyberattack spanning nine Mexican government organizations has become one of the clearest examples yet of how...

Learn More
Apr 13, 2026
Alleged Police Tipline Data Sale, iOS and Adobe Exploits, RDWeb Access...

Alleged Police Tipline Data Sale, iOS and Adobe Exploits, RDWeb Access Listings, and Gunra Recruitment SOCRadar’s Dark Web Team identified several new underground posts this week, including an alleged...

Learn More
Apr 13, 2026
CVE-2026-34621: Adobe Acrobat Reader Zero-Day Enables Arbitrary Code E...

CVE-2026-34621: Adobe Acrobat Reader Zero-Day Enables Arbitrary Code Execution via Crafted PDF Adobe released an emergency update for Adobe Acrobat and Adobe Acrobat Reader on Windows and macOS to add...

Learn More
Apr 13, 2026
Could XChat Become a Telegram Rival and a Future Hub for Threat Actors...

Could XChat Become a Telegram Rival and a Future Hub for Threat Actors? X’s upcoming messaging app, XChat, is being presented as more than a simple upgrade to direct messages. Public details point to ...

Learn More
Apr 10, 2026
How Phishing Kits Targeting U.S. Giants Are Built, Sold, and Deployed

How Phishing Kits Targeting U.S. Giants Are Built, Sold, and Deployed Modern phishing kits can steal authenticated sessions from Microsoft 365 and Google accounts in real time, even when MFA is enable...

Learn More
Apr 09, 2026
Dark Web Profile: TeamPCP

Dark Web Profile: TeamPCP TeamPCP is a financially motivated cybercriminal group that executed the most consequential open-source supply chain attack campaign of 2026, compromising security tools trus...

Learn More