May 03, 2024
The Impact of Cyber Attacks on the Stock Markets

The Impact of Cyber Attacks on the Stock Markets Today, many companies offer their shares to the public, allowing them to be traded on the stock exchange. This provides several advantages for companie...

Learn More
May 03, 2024
New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unaut...

New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114 A high-severity vulnerability, CVE-2024-32114, has been discovered in Apache ActiveMQ, potentially ...

Learn More
May 03, 2024
Top 10 Free IoC Search & Enrichment Platforms

Top 10 Free IoC Search & Enrichment Platforms Indicators of Compromise (IoCs) are critical pieces of threat intelligence that identify potential breaches in an endpoint or network. These digital a...

Learn More
May 02, 2024
Top 10 Takeaways from Verizon DBIR 2024 Report

Top 10 Takeaways from Verizon DBIR 2024 Report Verizon’s 17th annual Data Breach Investigations Report (DBIR) for 2024 offers an in-depth look at the latest trends in data breaches and cyber security ...

Learn More
May 02, 2024
The Future of Passwordless Authentication in Cybersecurity

The Future of Passwordless Authentication in Cybersecurity Passwordless authentication is a validation method that eliminates the use of traditional passwords. Instead, it leverages alternative method...

Learn More
Apr 30, 2024
Latin America Under Threat: The Venom RAT Campaign's Cyber Invasion In...

Latin America Under Threat: The Venom RAT Campaign’s Cyber Invasion Initiative In Latin America, there is a significant cyber threat posed by the Venom RAT campaign, necessitating swift and decisive a...

Learn More
Apr 29, 2024
New iMessage 0-Day Exploit, U.S. Healthcare Breach, Access Sales &...

New iMessage 0-Day Exploit, U.S. Healthcare Breach, Access Sales & Dark Web Recruitment Posts Each day, fresh threats surface on the Dark Web. In the “The Week in the Dark Web” series,...

Learn More
Apr 26, 2024
ShadowRay Campaign Exploits Critical Ray Framework Vulnerabilities to ...

ShadowRay Campaign Exploits Critical Ray Framework Vulnerabilities to Compromise AI Workloads Globally Since September 5, 2023, a sophisticated cyber threat named the ‘ShadowRay’ campaign has targeted...

Learn More
Apr 26, 2024
Threat Actor Profile: Molerats

Threat Actor Profile: Molerats Much like mole rats create an intricate network of underground tunnels, the cyber threat group known as Molerats has expertly burrowed its way through the digital defens...

Learn More
Apr 26, 2024
Could Your Email be Hacked? 2024 Analysis of Top Email Providers in St...

Could Your Email be Hacked? 2024 Analysis of Top Email Providers in Stealer Logs With the ever-present concern surrounding the security of email addresses and the accounts linked to them, there arises...

Learn More
Apr 25, 2024
Dark Web Profile: Red Ransomware

Dark Web Profile: Red Ransomware On April 3, 2024, a newly discovered ransomware group surfaced as Senior Threat Analyst Rakesh Krishnan shed light. Known as Red CryptoApp, this group began its operat...

Learn More
Apr 24, 2024
Beyond Phishing: Top 10 Data Breach Sets

Beyond Phishing: Top 10 Data Breach Sets In recent years, there has been a significant increase in the amount of sensitive data available, making cybercrime more of a risk even for people who aren’t v...

Learn More
Apr 24, 2024
APT28 Deploys ‘GooseEgg’ in Attacks Exploiting the Windows Print Spool...

APT28 Deploys ‘GooseEgg’ in Attacks Exploiting the Windows Print Spooler Vulnerability, CVE-2022-38028 Microsoft recently shed light on a campaign orchestrated by the Russian-based threat actor Forest...

Learn More
Apr 24, 2024
Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/i...

Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users The SOCRadar Dark Web Team recently discovered a leaked database containing sensitive customer information from Honda ...

Learn More
Apr 24, 2024
Deciphering Cyber Shadows: Insights into China and Russia’s Cybercrime...

Deciphering Cyber Shadows: Insights into China and Russia’s Cybercrime Ecosystems In an era where cyber threats loom large over global security, understanding the operational dynamics within notorious...

Learn More
Apr 24, 2024
Password Dictionary Analysis: Ultimate Wordlist of USA Passwords

Password Dictionary Analysis: Ultimate Wordlist of USA Passwords In the digital age, where our lives are increasingly connected with technology, the importance of securing our online accounts cannot b...

Learn More
Apr 22, 2024
Dark Peep #13: Money Laundering 1M1

Dark Peep #13: Money Laundering 1M1 Welcome to Dark Peep #13: Money Laundering 1M1, where the cyber landscape mirrors the shifting sands of the dark web, guided by the astute observations of SOCRadar ...

Learn More
Apr 22, 2024
Biggest Cybersecurity Risks SMEs Face and CTI as a Solution

Biggest Cybersecurity Risks SMEs Face and CTI as a Solution Small and Medium Enterprises (SMEs) can be considered the engine of their country’s economies. Their efforts result in economic growth. The ...

Learn More
Apr 19, 2024
Dark Web Profile: Akira Ransomware

Dark Web Profile: Akira Ransomware [Update] October 1, 2024: “What Are the Latest Akira News?” Since its discovery in early 2023, Akira ransomware has evolved from a seemingly ordinary addition to the...

Learn More
Apr 19, 2024
In the Crosshairs: Top 10 Threat Actors Targeting the USA

In the Crosshairs: Top 10 Threat Actors Targeting the USA As the digital landscape continues to evolve, the United States finds itself at the forefront of emerging cybersecurity challenges. With its c...

Learn More