Major Cyber Attacks in Review: March 2024
Major Cyber Attacks in Review: March 2024 March 2024 witnessed a wave of cyber attacks targeting prominent organizations globally. From telecommunications giants to government pension funds, several h...
Cyber Reflections of Iran's Attack on Israel
Cyber Reflections of Iran’s Attack on Israel On Saturday and early Sunday, Iran launched a series of missile and drone attacks aimed at Israel. This retaliation came after a suspected Israeli strike o...
José Ferreira's Insights on Elevating Healthcare Cybersecurity: Strate...
José Ferreira’s Insights on Elevating Healthcare Cybersecurity: Strategies and Challenges In a landscape where cyber threats constantly evolve and present new challenges, especially in critical ...
0-Day Exploits for Outlook and Windows, AnyDesk Access Sale, LeadSquar...
0-Day Exploits for Outlook and Windows, AnyDesk Access Sale, LeadSquared and WeRize Database Leaks Explore the latest cyber threats with SOCRadar Dark Web Team’s findings. Concerning posts on hacker f...
Critical PHP Vulnerabilities: Update Now to Prevent Takeovers and Comm...
Critical PHP Vulnerabilities: Update Now to Prevent Takeovers and Command Injection (CVE-2024-1874, CVE-2024-2756, CVE-2024-3096, CVE-2024-2757) The PHP development team recently announced security up...
Cybersecurity Implications of Deepfakes
Cybersecurity Implications of Deepfakes The year 2024 is an important year in cybersecurity. With fast developments in technology, cyber threats have evolved to use more modern tactics, such as deepfa...
Critical OS Command Injection Vulnerability in Palo Alto's GlobalProte...
Critical OS Command Injection Vulnerability in Palo Alto’s GlobalProtect Gateway: CVE-2024-3400. The patch is not available yet. [Update] April 15, 2024: “Hotfixes Available: Palo Alto Addresses CVE-2...
ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI
ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI Stealer logs serve as the underground repositories of stolen data, filled with sensitive information such as payment card details and c...
Top 10 Dark Web Markets
Top 10 Dark Web Markets The dark web hosts markets like the internet’s Wild West. Sites like Silk Road and Nemesis have shown how deep this underworld goes. The shutdown of these platforms is a big wi...
Microsoft’s April 2024 Patch Tuesday, 149 Vulnerabilities Patched, Inc...
Microsoft’s April 2024 Patch Tuesday, 149 Vulnerabilities Patched, including 2 Zero-Day Vulnerabilities Microsoft’s April 2024 Patch Tuesday was a substantial release addressing a total of 149 securit...
How to Monitor Your Supply Chain’s Dark Web Activities?
How to Monitor Your Supply Chain’s Dark Web Activities? As organizations rely on complex networks of suppliers and vendors to deliver goods and services, ensuring the integrity and resilience of these...
Top 10 CTI Blogs You Need to Follow
Top 10 CTI Blogs You Need to Follow CTI blogs play an important role in keeping security professionals up to date on the latest threats, trends, and defensive strategies, providing in-depth analysis, ...
Top 10 Threat Intelligence Podcasts
Top 10 Threat Intelligence Podcasts Podcasts provide an easy and effective way to stay up to date on the threat intelligence landscape. They cover a wide range of topics, including insights into the m...
Latest Dark Web Sales: Exploits, 0-Days, Financial & Government Data L...
Latest Dark Web Sales: Exploits, 0-Days, Financial & Government Data Leaks, DarkVR Service The SOCRadar Dark Web Team’s recent discoveries reveal a range of concerning cyber threats. These include...
Cybersecurity Risks During 2024 Indian General Elections
Cybersecurity Risks During 2024 Indian General Elections General elections in India will be held from April 19 to June 1, 2024. In the context of election security in cyberspace, a couple of points ca...
Dark Web Profile: Mallox Ransomware
Dark Web Profile: Mallox Ransomware Mallox, a strain of ransomware and a group with the same name, encrypts its victims’ data and subsequently demands a ransom, typically in cryptocurrency, in return ...
CISA Adds SOCRadar Labs to its Resources & Tools
CISA Adds SOCRadar Labs to its Resources & Tools In a significant move to bolster cybersecurity resilience, the Cybersecurity and Infrastructure Security Agency (CISA) has officially included SOC...
Dark Web Profile: DonutLeaks
Dark Web Profile: DonutLeaks In 2022, the DonutLeaks group emerged as a significant player, demonstrating a sophisticated approach to data extortion. Linked to cyber incidents targeting notable enterp...
Cybersecurity Challenges in 2024 United Kingdom’s Elections
Cybersecurity Challenges in 2024 United Kingdom’s Elections Cybersecurity challenges are expected to play a significant role in the upcoming United Kingdom elections in 2024. As the world becomes more...
Ivanti Connect Secure and Policy Secure Gateways Vulnerable to DoS and...
Ivanti Connect Secure and Policy Secure Gateways Vulnerable to DoS and Code Execution (CVE-2024-21894) Ivanti recently released patches to fix multiple vulnerabilities found in their popular Connect S...