Apr 19, 2024
Rise of Malicious AI Tools: A Case Study with HackerGPT

Rise of Malicious AI Tools: A Case Study with HackerGPT Artificial intelligence, particularly generative models, has become increasingly prevalent over the past few years. Its impact on the workforce ...

Learn More
Apr 18, 2024
OpenMetadata Vulnerabilities Allow Attackers to Cryptomine in Kubernet...

OpenMetadata Vulnerabilities Allow Attackers to Cryptomine in Kubernetes Environments Recent findings from a Microsoft security blog reveal that attackers exploit newly discovered critical vulnerabili...

Learn More
Apr 18, 2024
Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations

Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations We are all aware that reactive measures are insufficient in this age of cyber threats; businesses must take proactive steps to ef...

Learn More
Apr 17, 2024
CVE-2024-21006 in Oracle WebLogic Server – Oracle’s April 2024 Update ...

CVE-2024-21006 in Oracle WebLogic Server – Oracle’s April 2024 Update Brings 441 New Security Patches Oracle has released its Critical Patch Update advisory for April 2024, which addresses vulnerabili...

Learn More
Apr 17, 2024
Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in...

Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in Open Source Security Recent events have brought to light critical issues related to cybersecurity threats and social engineering ...

Learn More
Apr 17, 2024
Ivanti Avalanche Received an Update for Over Two Dozen Vulnerabilities...

Ivanti Avalanche Received an Update for Over Two Dozen Vulnerabilities (CVE-2024-24996, CVE-2024-29204…) Ivanti has recently issued security updates to address multiple vulnerabilities in Avalanche. T...

Learn More
Apr 17, 2024
Dark Web Monitoring with Open-Source Tools and Services

Dark Web Monitoring with Open-Source Tools and Services The dark web, intentionally hidden on the internet, is accessible only through specialized browsers or technologies. Defenders monitor it for cl...

Learn More
Apr 16, 2024
Major Cyber Attacks in Review: March 2024

Major Cyber Attacks in Review: March 2024 March 2024 witnessed a wave of cyber attacks targeting prominent organizations globally. From telecommunications giants to government pension funds, several h...

Learn More
Apr 15, 2024
Cyber Reflections of Iran's Attack on Israel

Cyber Reflections of Iran’s Attack on Israel [Update] April 22, 2024: “Israeli Hackers Strike Back: Cyber Av3ngers Hacked” [Update] April 17, 2024: “Ongoing Hacktivist Activities” On Saturday and earl...

Learn More
Apr 15, 2024
José Ferreira's Insights on Elevating Healthcare Cybersecurity: Strate...

José Ferreira’s Insights on Elevating Healthcare Cybersecurity: Strategies and Challenges In a landscape where cyber threats constantly evolve and present new challenges, especially in critical ...

Learn More
Apr 15, 2024
0-Day Exploits for Outlook and Windows, AnyDesk Access Sale, LeadSquar...

0-Day Exploits for Outlook and Windows, AnyDesk Access Sale, LeadSquared and WeRize Database Leaks Explore the latest cyber threats with SOCRadar Dark Web Team’s findings. Concerning posts on hacker f...

Learn More
Apr 15, 2024
Critical PHP Vulnerabilities: Update Now to Prevent Takeovers and Comm...

Critical PHP Vulnerabilities: Update Now to Prevent Takeovers and Command Injection (CVE-2024-1874, CVE-2024-2756, CVE-2024-3096, CVE-2024-2757) The PHP development team recently announced security up...

Learn More
Apr 12, 2024
Cybersecurity Implications of Deepfakes

Cybersecurity Implications of Deepfakes The year 2024 is an important year in cybersecurity. With fast developments in technology, cyber threats have evolved to use more modern tactics, such as deepfa...

Learn More
Apr 12, 2024
Critical OS Command Injection Vulnerability in Palo Alto's GlobalProte...

Critical OS Command Injection Vulnerability in Palo Alto’s GlobalProtect Gateway: CVE-2024-3400. The patch is not available yet. [Update] April 17, 2024: “PoC Exploit Available for CVE-2024-3400: Rese...

Learn More
Apr 11, 2024
ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI

ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI Stealer logs serve as the underground repositories of stolen data, filled with sensitive information such as payment card details and c...

Learn More
Apr 11, 2024
Top 10 Dark Web Markets

Top 10 Dark Web Markets The dark web hosts markets like the internet’s Wild West. Sites like Silk Road and Nemesis have shown how deep this underworld goes. The shutdown of these platforms is a big wi...

Learn More
Apr 10, 2024
Microsoft’s April 2024 Patch Tuesday, 149 Vulnerabilities Patched, Inc...

Microsoft’s April 2024 Patch Tuesday, 149 Vulnerabilities Patched, including 2 Zero-Day Vulnerabilities Microsoft’s April 2024 Patch Tuesday was a substantial release addressing a total of 149 securit...

Learn More
Apr 10, 2024
How to Monitor Your Supply Chain’s Dark Web Activities?

How to Monitor Your Supply Chain’s Dark Web Activities? As organizations rely on complex networks of suppliers and vendors to deliver goods and services, ensuring the integrity and resilience of these...

Learn More
Apr 10, 2024
Top 10 CTI Blogs You Need to Follow

Top 10 CTI Blogs You Need to Follow CTI blogs play an important role in keeping security professionals up to date on the latest threats, trends, and defensive strategies, providing in-depth analysis, ...

Learn More
Apr 09, 2024
Top 10 Threat Intelligence Podcasts

Top 10 Threat Intelligence Podcasts Podcasts provide an easy and effective way to stay up to date on the threat intelligence landscape. They cover a wide range of topics, including insights into the m...

Learn More