
Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com A...
Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com Access Sale SOCRadar’s Dark Web Team uncovered alarming activity on hacker forums, including a powerful new Mirai botnet service fo...

Understanding Identity and Access Management (IAM)
Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and remote work have become the norm, managing who has access to sensitive data and systems will dete...

BeyondTrust Security Incident — Command Injection and Escalation Weakn...
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) [Update] January 14, 2025: “CVE-2024-12686 Enters the KEV Catalog” BeyondTrust’...

Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabi...
Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729) Recent security patches for Sophos Firewall address several serious vulner...

Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Exec...
Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Execution; Next.js Auth Bypass (CVE-2024-51479) Fortinet and the popular React framework Next.js have recently addressed serious secur...

The Year of Takedowns: Significant Law Enforcement Operations of 2024
The Year of Takedowns: Significant Law Enforcement Operations of 2024 As 2024 comes to a close, the global fight against cybercrime has witnessed a series of groundbreaking law enforcement operations ...

Dark Web Market: BidenCash
Dark Web Market: BidenCash Dark web markets have become a thriving hub for cybercriminals, trading stolen data, compromised credentials, and illicit tools. Among these, BidenCash has emerged as a sign...

Canada’s Top Cybersecurity Threats: How Attackers Target Critical Indu...
Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries As Canada experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cybe...

Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misad...
Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures If the events from dark web this series were a script, it would be the kind of thriller where everyone fumbles their part...

Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience...
Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience As India experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cyber threa...

Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – ...
Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s Latest Attack Vector [Update] April 8, 2025: “WK Kellogg Confirms Data Breach Tied to Cleo Exploits” [Update] ...

Chrome/Edge Exploit, Aliena Botnet, and Massive Data Breaches Uncovere...
Chrome/Edge Exploit, Aliena Botnet, and Massive Data Breaches Uncovered Hacker forums monitored by SOCRadar’s Dark Web Team have revealed several alarming cyber threats this week, including the sale o...

BadBox Malware Compromises 30,000 Devices in Germany
BadBox Malware Compromises 30,000 Devices in Germany The German Federal Office for Information Security (BSI) has taken decisive action to stop the BadBox malware campaign, which affected over 30,000 ...

The Future of AI-Powered Threat Detection in Cybersecurity
The Future of AI-Powered Threat Detection in Cybersecurity As cyber threats grow more sophisticated, the demand for advanced detection mechanisms becomes increasingly critical. AI-powered threat detec...

Leveraging AI to Combat Insider Threats in Enterprises
Leveraging AI to Combat Insider Threats in Enterprises Insider threats represent a significant risk to enterprise security, often resulting in financial loss, reputational damage, and operational disr...

Is Your Personal Data for Sale on the Dark Web? Risks and Protection S...
Is Your Personal Data for Sale on the Dark Web? Risks and Protection Strategies The Dark Web has grown into a bustling market for stolen personal data, where cybercriminals trade sensitive information...

Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Serve...
Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Server The cybersecurity landscape is evolving at an unprecedented pace, with organizations facing increasingly sophisticated and persi...

Major Cyber Attacks Targeting the Telecommunication Industry (2023 - 2...
Major Cyber Attacks Targeting the Telecommunication Industry (2023 – 2024) The telecommunication industry plays a vital role in connecting the world, supporting everything from personal communications...

CISO's Guide to Navigating Dark Web Risks – How to Protect Your Organi...
CISO’s Guide to Navigating Dark Web Risks – How to Protect Your Organization As cyber threats grow increasingly sophisticated, Chief Information Security Officers (CISOs) are tasked with defendi...

Major Cyber Attacks in Review: November 2024
Major Cyber Attacks in Review: November 2024 November 2024 brought several high-profile cyber attacks that targeted critical sectors, including telecommunications, supply chain management, and healthc...