Top 10 Deepfake Scams Impacting Industries Worldwide
Top 10 Deepfake Scams Impacting Industries Worldwide Deepfake technology has emerged as an effective tool for both creative and malicious purposes. This technology employs AI to generate highly realis...
New Security Vulnerability "regreSSHion" Exposes Millions of Linux Ope...
New Security Vulnerability “regreSSHion” Exposes Millions of Linux OpenSSH Servers to RCE Attacks (CVE-2024-6387) [Update] July 2, 2024: “PoC Exploit for regreSSHion Vulnerability (CVE-2024-6387) Surf...
Alleged Data Leaks of Truist Bank, Twilio Authy, Genesis Market, and S...
Alleged Data Leaks of Truist Bank, Twilio Authy, Genesis Market, and Skull OTP BOT The SOCRadar Dark Web Team has identified several critical cyber incidents involving major financial institutions and...
CISO Guide for Quantum Computing: Risks and Opportunities (Part II)
CISO Guide for Quantum Computing: Risks and Opportunities (Part II) While the specter of quantum computing as a new source of threats usually dominates the discussion, it is imperative to note that wh...
Top 10 Phishing Simulation Tools
Top 10 Phishing Simulation Tools Phishing attacks continue to pose a significant threat, affecting both individuals and organizations. To combat these threats, a variety of phishing simulation tools h...
Dark Web Profile: IntelBroker
Dark Web Profile: IntelBroker IntelBroker, a notorious figure known for orchestrating high-profile cyberattacks, operates within BreachForums. Specializing in identifying and selling access to comprom...
GitLab Issues Critical Patches for CE/EE Alongside Fortra & MOVEit (CV...
GitLab Issues Critical Patches for CE/EE Alongside Fortra & MOVEit (CVE-2024-5655, CVE-2024-5276, CVE-2024-5805, CVE-2024-5806) GitLab has rolled out new security updates for both its Community Ed...
Polyfill Fuels Supply Chain Concerns with Malicious Redirects: +100,00...
Polyfill Fuels Supply Chain Concerns with Malicious Redirects: +100,000 Websites Affected Latest Update: “Polyfill Issue Affects +380,000 Hosts and Major Companies, With Ongoing New Domain Regis...
Julian Assange Released, But the Leak and Extortion Era Began Long Ago
Julian Assange Released, But the Leak and Extortion Era Began Long Ago WikiLeaks founder Julian Assange has been freed in the UK after serving over five years in Belmarsh prison for what the U.S. gove...
Cyber Threats for the Upcoming 2024 Paris Olympics
Cyber Threats for the Upcoming 2024 Paris Olympics The world is eagerly waiting for the Paris Olympics to come. The event is not only going to be a scene for the best athletes in the world to compete ...
An Overview of Intelligence Requirements in CTI
An Overview of Intelligence Requirements in CTI Security, in general, is a complex domain where you need to keep in mind a variety of factors. In a complex field like this, the role of intelligence ca...
Tracking Down Notorious Ransomware Actors with CTI 2.0
Tracking Down Notorious Ransomware Actors with CTI 2.0 Alex was talking to his security team when his boss called him into his office one day. News about ransomware attacks across the industry has bee...
IntelBroker Claims Apple, AMD Data Breaches; NSA Data Allegedly Leaked
IntelBroker Claims Apple, AMD Data Breaches; NSA Data Allegedly Leaked The SOCRadar Dark Web Team has uncovered several alarming posts on hacker forums, revealing significant breaches and data sales i...
CISO Guide for Quantum Computing: Risks and Opportunities (Part I)
CISO Guide for Quantum Computing: Risks and Opportunities (Part I) For Chief Information Security Officers (CISOs) in charge of cybersecurity, quantum computing brings its paradox. It is both an oppor...
Top 10 VPN Vulnerabilities (2022 – H1 2024)
Top 10 VPN Vulnerabilities (2022 – H1 2024) In the landscape of cybersecurity, VPN security has become a critical concern for organizations worldwide. Compared to 2022, there was a staggering 47% incr...
Dark Web Profile: dAn0n Hacker Group
Dark Web Profile: dAn0n Hacker Group Global law enforcement agencies have ramped up their efforts against ransomware, leading to the weakening of groups and even dethroned the long ruled LockBit. Howe...
Dark Web Profile: SpaceBears
Dark Web Profile: SpaceBears Recent history could be termed the Age of Ransomware in the realm of cybercrime. However, threat actors have discovered a way to profit without the need for malware develo...
Shedding Light on the Netherlands Threat Landscape Report
Shedding Light on the Netherlands Threat Landscape Report In an era of dynamic change in digital threats, there is more need for knowledge of regional cybersecurity challenges than ever. Therefore, it...
Dark Web Profile: DragonForce Ransomware
Dark Web Profile: DragonForce Ransomware DragonForce Ransomware has emerged as an intriguing adversary. Known for its prominent targets and unusual ways of communication, it has quickly gained notorie...
Zero-Day Exploits for Windows, Atlassian, Mastodon Data Leak, DDoS Att...
Zero-Day Exploits for Windows, Atlassian, Mastodon Data Leak, DDoS Attack on FC Bayern Munich The SOCRadar Dark Web Team has recently uncovered several alarming posts on hacker forums and Telegram cha...