Financial Software Company Finastra Investigates Recent Security Incid...
Financial Software Company Finastra Investigates Recent Security Incident Finastra, a prominent financial services software provider, is currently investigating a cybersecurity incident that has raise...
Hackers Don't Hack, They Log In – Stealer Logs and Identity Attacks
Hackers Don’t Hack, They Log In – Stealer Logs and Identity Attacks Cyber threat actors are moving beyond traditional methods like exploiting vulnerabilities or brute-forcing passwords. Instead, they ...
Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Sys...
Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws Recent findings have exposed high-severity flaws in the needrestart utility, a key component ...
Apple, Oracle, and Apache Issue Critical Updates for Actively Exploite...
Apple, Oracle, and Apache Issue Critical Updates for Actively Exploited and High-Risk Vulnerabilities Organizations using Apple, Oracle, and Apache software must act quickly as critical security flaws...
Top 10 Metrics Every CISO Should Track for Better Security
Top 10 Metrics Every CISO Should Track for Better Security Chief Information Security Officers (CISOs) must navigate a wide range of threats and vulnerabilities in order to effectively protect their o...
Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0...
Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0012 and CVE-2024-9474) [Update] November 22, 2024: “Growing Exploitation of Palo Alto Networks PAN-OS Vulnerabilities” Palo Alto ...
How Stealer Logs Target E-Commerce Giants During Black Friday
How Stealer Logs Target E-Commerce Giants During Black Friday As the holiday season approaches, Black Friday stands out as one of the busiest shopping days of the year. For consumers, it’s an opportun...
Asia Hacktivist Threat Landscape
Asia Hacktivist Threat Landscape Hacktivism blurs the lines between digital rebellion and activism, as threat actors act for their social and political causes. Far from the traditional protest, hackti...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of F...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of France Targeted Recently, SOCRadar’s Dark Web Team has identified an alleged data breach at Ford Motor Company that exposed 44,000 ...
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insi...
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights Today, when the world is increasingly moving towards digital operation, stolen data circulating on the Dark Web has been a ni...
Dark Web Profile: Cadet Blizzard
Dark Web Profile: Cadet Blizzard Cadet Blizzard (DEV-0586) is a Russian GRU-affiliated cyber threat group first tracked by Microsoft in early 2022, following a series of disruptive cyberattacks on Ukr...
Google’s Cybersecurity Forecast 2025 (Key Insights and Trends for the ...
Google’s Cybersecurity Forecast 2025 (Key Insights and Trends for the Year Ahead) As 2024 draws to a close, Google Cloud Security’s Cybersecurity Forecast 2025 offers a grounded outlook on the cyberse...
What is Adversarial Threat Emulation and Validation?
What is Adversarial Threat Emulation and Validation? How prepared is your organization to face the same tactics used by the most advanced cyber attackers? Adversarial threat emulation answers this que...
Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed,...
Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed, Two Active Zero-Day Exploits Microsoft has released its latest security updates with November 2024 Patch Tuesday, addressing a br...
Major Cyber Attacks in Review: October 2024
Major Cyber Attacks in Review: October 2024 October 2024 brought a wave of high-profile cyber incidents across various sectors, highlighting the ongoing challenges in digital security. Financial insti...
Critical RCE in Ivanti Endpoint Manager, Citrix Virtual Apps & Desktop...
Critical RCE in Ivanti Endpoint Manager, Citrix Virtual Apps & Desktops Flaws – Patch Now [Update] November 19, 2024: “Exploitation of CVE-2024-8068 and CVE-2024-8069 Confirmed” Two re...
Identity is the New Perimeter: An Infostealer Perspective
Identity is the New Perimeter: An Infostealer Perspective As organizations navigate an increasingly complex IT landscape, traditional security boundaries continue to dissolve. The modern environment i...
Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Rec...
Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records Data breaches have become increasingly common, affecting millions of users across various sectors. One of the latest high-pro...
MOVEit Data Leak Exposes Employee Data of Amazon, HSBC & More – What Y...
MOVEit Data Leak Exposes Employee Data of Amazon, HSBC & More – What You Need to Know A new wave of data leaks tied to the infamous MOVEit vulnerability has rattled the cybersecurity landscape onc...
489 Million Instagram Accounts Scraped and Listed for Sale on Dark Web
489 Million Instagram Accounts Scraped and Listed for Sale on Dark Web A recent post on a Dark Web hacker forum has sparked widespread concern, with a threat actor claiming to possess a massive datase...