
Dark Web Profile: Just Evil
Dark Web Profile: Just Evil [Update] October 23, 2024: “Founder of Just Evil and KillNet Allegedly Killed in Drone Attack” Just Evil is a pro-Russian cyber threat group formed in January 2024 by KillM...

How the FBI Dismantled Raptor Train, a Major China State-Sponsored Bot...
How the FBI Dismantled Raptor Train, a Major China State-Sponsored Botnet In a major breakthrough, the FBI has recently dismantled “Raptor Train,” an extensive botnet controlled by state-s...

Safeguarding Your Business: The Importance of Fraud Protection
Safeguarding Your Business: The Importance of Fraud Protection In the past, banks employed various methods to protect their customers’ money. They installed heavy-duty vaults made of steel and iron to...

UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War...
UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War an Overview As the Russia-Ukraine war unfolds, its impact extends far beyond the battlefield, rippling through cyberspace and aff...

Critical Patches Released for VMware vCenter Server and GitLab (CVE-20...
Critical Patches Released for VMware vCenter Server and GitLab (CVE-2024-38812, CVE-2024-45409) [Update] October 7, 2024: “PoC Exploit and Details Released for CVE-2024-45409 Affecting GitLab...

Top 10 Free Penetration Testing Tools
Top 10 Free Penetration Testing Tools Penetration testing, or pentesting, is a security practice where real-world attacks are simulated on an organization’s systems to identify vulnerabilities and sec...

SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead o...
SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead of Cyber Threats Cyber threats come in many forms, driven by diverse motivations from ransomware that seeks financial gain to polit...

Cyber Insurance and Protecting Against Security Breaches
Cyber Insurance and Protecting Against Security Breaches With the rise of digital threats, cyber insurance has become an important part of risk management for businesses of all sizes. As cyberattacks ...

Major Cyber Attacks in Review: August 2024
Major Cyber Attacks in Review: August 2024 August 2024 witnessed a series of impactful cyber attacks targeting industries from airport services in Canada to key financial institutions in the U.S. This...

Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Dat...
Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Data Exposed The SOCRadar Dark Web Team continues its diligent monitoring of the hacker landscape; several significant cyber threats ...

The Buyer's Guide to Extended Threat Intelligence - SOCRadar
The Buyer’s Guide to Extended Threat Intelligence – SOCRadar Imagine walking into the office on a regular Tuesday morning. As the CISO, you grab your coffee, sit at your desk, and are immediately floo...

Using Artificial Intelligence in Cybersecurity (Ultimate Guide)
Using Artificial Intelligence in Cybersecurity (Ultimate Guide) Welcome to the first of our ultimate guides on cybersecurity topics, starting with artificial intelligence in cybersecurity. In these co...

Fortinet Data Breach: What We Know So Far
Fortinet Data Breach: What We Know So Far On September 12, Fortinet, a prominent cybersecurity company, acknowledged a security incident involving unauthorized access to a third-party cloud-based file...

What is SOCRadar's Advanced Dark Web Monitoring?
What is SOCRadar’s Advanced Dark Web Monitoring? SOCRadar’s Advanced Dark Web Monitoring is a cutting-edge cybersecurity product designed to protect organizations from the various threats emerging fro...

Microsoft’s September 2024 Patch Tuesday Addresses 79 CVEs, 4 Zero-Day...
Microsoft’s September 2024 Patch Tuesday Addresses 79 CVEs, 4 Zero-Days; Critical Ivanti EPM Updates [Update] September 17, 2024: “PoC Exploit Released for Critical Ivanti EPM Vulnerability (CVE...

Top 10 Trends in Phishing Attacks (2024)
Top 10 Trends in Phishing Attacks (2024) Phishing continues to evolve in 2024, posing a significant threat to both individuals and organizations. This form of social engineering is designed to deceive...

Dark Web Profile: GlorySec
Dark Web Profile: GlorySec GlorySec is a hacktivist group that has quickly gained notoriety for targeting governments and institutions it deems corrupt, particularly in Russia and Venezuela at the tim...

Akira Ransomware Targets SonicWall Vulnerability (CVE-2024-40766) – Im...
Akira Ransomware Targets SonicWall Vulnerability (CVE-2024-40766) – Immediate Patching Required [Update] October 4, 2024: “Majority of SonicWall Devices Remain Unpatched for CVE-2024-40766, Patc...

Alleged Leaks Affect Millions: VK, BMW Hong Kong, Shopee Logistics, an...
Alleged Leaks Affect Millions: VK, BMW Hong Kong, Shopee Logistics, and More The SOCRadar Dark Web Team has uncovered several major cyber threats on the Dark Web, including the alleged database leaks ...

Understanding the Components of Information Security Risk Management
Understanding the Components of Information Security Risk Management Information Security Risk Management (ISRM) plays a critical role in safeguarding sensitive data and ensuring that risks are identi...