Jun 03, 2024
A Look at the Security Challenges Threatening E-Commerce Websites – Vu...

A Look at the Security Challenges Threatening E-Commerce Websites – Vulnerabilities, Skimmers, Phishing In the fast-paced world of e-commerce, cyber threats rise as much as the sector’s expandin...

Learn More
Jun 02, 2024
Overview of the Snowflake Breach: Threat Actor Offers Data of Cloud Co...

Overview of the Snowflake Breach: Threat Actor Offers Data of Cloud Company’s Customers This blog actively documents significant updates related to the Snowflake Breach. Latest update: “DOJ Indictment...

Learn More
May 31, 2024
New in CISA KEV: Check Point VPN Zero-Day CVE-2024-24919 & Linux Kerne...

New in CISA KEV: Check Point VPN Zero-Day CVE-2024-24919 & Linux Kernel Flaw CVE-2024-1086 The U.S. Cybersecurity and Infrastructure Agency (CISA) updated its Known Exploited Vulnerabilities (KEV)...

Learn More
May 31, 2024
GuptiMiner Campaign: The Trojan Tango of Infiltrating Antivirus Update...

GuptiMiner Campaign: The Trojan Tango of Infiltrating Antivirus Updates for Deception The GuptiMiner malware campaign is creating significant disruption in the cybersecurity landscape by exploiting a ...

Learn More
May 31, 2024
Top 10 Supply Chain Monitoring Platforms

Top 10 Supply Chain Monitoring Platforms In today’s globalized business environment, nearly every organization is part of a complex web of interdependencies. This interconnectedness, while enabl...

Learn More
May 30, 2024
Unleashing AI's Potential: Top 10 Tools for CISO for Security (Part-1)

Unleashing AI’s Potential: Top 10 Tools for CISO for Security (Part-1) One of the most important shifts in the dynamic, modern cyber warfare space is the changing role of the CISO. Advanced threats fo...

Learn More
May 30, 2024
Detecting Leaked Credentials with Identity & Access Intelligence

Detecting Leaked Credentials with Identity & Access Intelligence Stealers are malicious software engineered by threat actors to compromise systems. Comparable to burglars, these trojans covertly e...

Learn More
May 30, 2024
Top 5 Phishing Domain Takedown Service

Top 5 Phishing Domain Takedown Service Phishing attacks continue to pose a significant threat to both individuals and organizations. As cyber criminals continue to improve their strategies for exploit...

Learn More
May 30, 2024
Progress Telerik Report Server Receives Security Update for Critical A...

Progress Telerik Report Server Receives Security Update for Critical Auth Bypass Vulnerability, CVE-2024-4358 [Update] June 14, 2024: “CISA Adds CVE-2024-4358 to Known Exploited Vulnerabilities Catalo...

Learn More
May 29, 2024
PoC Exploit for CVE-2024-4956 in Sonatype Nexus Repository 3 Draws Thr...

PoC Exploit for CVE-2024-4956 in Sonatype Nexus Repository 3 Draws Threat Actors’ Attention Sonatype recently released a security advisory alerting users to a high-severity security vulnerabilit...

Learn More
May 29, 2024
False Positives: Million Dollars Worth Issues – Spoiler: It is not eve...

False Positives: Million Dollars Worth Issues – Spoiler: It is not even an issue. Fairy tales for adults: from the boy who cried wolf to alert fatigue. Once upon a time, a shepherd boy, bored with his...

Learn More
May 28, 2024
Top 10 Stealer Logs

Top 10 Stealer Logs Stealer logs are a critical concern as they involve the theft of sensitive information from infected systems. These digital threats, primarily aimed at acquiring data such as passw...

Learn More
May 27, 2024
New Cyber Attack Campaign Bombarding Organizations with Fake Emails an...

New Cyber Attack Campaign Bombarding Organizations with Fake Emails and Phone Calls The cyber threat landscape is always changing, with attackers using new methods to get into organizations and exploi...

Learn More
May 27, 2024
VPN Exploit, ATM Malware, and Database Leaks of MediSecure, Indian Vot...

VPN Exploit, ATM Malware, and Database Leaks of MediSecure, Indian Voter Portal, and PetroERP The SOCRadar Dark Web Team has uncovered several critical cyber threats within the past week. Among these ...

Learn More
May 24, 2024
Freely Discover Dark Web Threats of Your Organization: Dark Web Report

Freely Discover Dark Web Threats of Your Organization: Dark Web Scan Report The dark web is a hotbed of dangers, a host for various cyber threats due to its nature. Each day, illicit markets overflow ...

Learn More
May 24, 2024
CVE-2020-17519 in Apache Flink Enters CISA’s KEV Catalog & GitLab ...

CVE-2020-17519 in Apache Flink Enters CISA’s KEV Catalog & GitLab Patches XSS Flaw, CVE-2024-4835 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Ex...

Learn More
May 24, 2024
DNSBomb: A New DoS Threat Targeting Critical Internet Infrastructure

DNSBomb: A New DoS Threat Targeting Critical Internet Infrastructure Illustrative Image – Generated by DALL-E ...

Learn More
May 24, 2024
Dark Web Profile: Hunt3r Kill3rs

Dark Web Profile: Hunt3r Kill3rs In the ever-evolving landscape of cybersecurity threats, new groups like Hunt3r Kill3rs emerge with claims of disruptive capabilities. This analysis aims to provide an...

Learn More
May 24, 2024
Explore SOCRadar's Advanced Certified Training Program

Stay Ahead in Cybersecurity: Explore SOCRadar’s Advanced Certified Training Program The biggest challenge in cybersecurity is staying ahead of threats, and it requires continuous learning and adaptati...

Learn More
May 23, 2024
Third-Party Vendor Breaches: Causes, Key Statistics, Recent Incidents,...

Third-Party Vendor Breaches: Causes, Key Statistics, Recent Incidents, and Effective Mitigation Strategies In modern business operations, most organizations extend their activities beyond their immedi...

Learn More