Mar 12, 2024
Critical CVE-2024-21899 Vulnerability in QNAP Products; Upcoming PoC E...

Critical CVE-2024-21899 Vulnerability in QNAP Products; Upcoming PoC Exploit for Outlook Vulnerability, CVE-2024-21378 QNAP recently addressed three vulnerabilities affecting their QTS, QuTS hero, QuT...

Learn More
Mar 11, 2024
Acuity Federal Contractor Breach, Okta Customers Leak, DCRat Exploit a...

Acuity Federal Contractor Breach, Okta Customers Leak, DCRat Exploit and Access Sales In the Dark Web, a world of illicit activities and cyber threats, the SOCRadar Dark Web Team has uncovered a serie...

Learn More
Mar 11, 2024
Operational Technology (OT) and Cybersecurity: Safeguarding Critical I...

Operational Technology (OT) and Cybersecurity: Safeguarding Critical Infrastructure Operational Technology (OT) encompasses hardware and software capable of detecting or inducing alterations in indust...

Learn More
Mar 11, 2024
Top 5 Paste Sites Used by Threat Actors

Top 5 Paste Sites Used by Threat Actors Paste sites are increasingly being utilized as hubs for disseminating code snippets, configuration files, and assorted textual data. While they offer valuable r...

Learn More
Mar 08, 2024
Critical Veritas NetBackup & JFrog Artifactory Vulnerabilities (CVE-20...

Critical Veritas NetBackup & JFrog Artifactory Vulnerabilities (CVE-2024-28222, CVE-2023-42662); CISA Alert for Cisco Flaws New critical vulnerabilities have surfaced in Veritas NetBackup and JFro...

Learn More
Mar 08, 2024
The Dangers of Third-Party App Stores: Risks and Precautions

The Dangers of Third-Party App Stores: Risks and Precautions When downloading applications, smartphone users typically consider the pre-installed Apple App Store or Google Play. However, there are oth...

Learn More
Mar 08, 2024
Dark Peep #12: The Ransomware Group That Never Was

Dark Peep #12: The Ransomware Group That Never Was Welcome to Dark Peep #12, where we dive into the latest cyber escapades reminiscent of tales from the Wild West. This edition is packed with stories ...

Learn More
Mar 07, 2024
How to Leverage Threat Intelligence in Incident Response

How to Leverage Threat Intelligence in Incident Response In the ever-evolving landscape of cybersecurity threats, incident response has become a crucial component of any organization’s defense s...

Learn More
Mar 07, 2024
Navigating the Shadowy Depths of the Migo Malware Campaign

Navigating the Shadowy Depths of the Migo Malware Campaign The Migo malware campaign emerged as a formidable adversary, targeting Redis servers with novel system-weakening techniques aimed at cryptoja...

Learn More
Mar 06, 2024
VMware ESXi, Workstation, Fusion Vulnerabilities Allow Code Execution,...

VMware ESXi, Workstation, Fusion Vulnerabilities Allow Code Execution, Sandbox Escape (CVE-2024-22252 – 22255) [Update] March 7, 2024: “CISA Urges Swift Patching of VMware Vulnerabilities” VMware has ...

Learn More
Mar 05, 2024
ALPHV's Roller Coaster, $22 Million Ransom

ALPHV’s Roller Coaster, $22 Million Ransom [Update] March 7, 2024: “Money Paid, Data Retained; ALPHV’s Exit Scam” The ransomware attack on Change Healthcare has become one of the most disruptive...

Learn More
Mar 05, 2024
TeamCity On-Premises Vulnerabilities Threaten Supply Chains (CVE-2024-...

TeamCity On-Premises Vulnerabilities Threaten Supply Chains (CVE-2024-27198, CVE-2024-27199); Android March 2024 Updates [Update] March 12, 2024: “BianLian Exploits JetBrains TeamCity Vulnerabilities ...

Learn More
Mar 04, 2024
Defending the Inbox: Vulnerabilities of Secure Email Gateways

Defending the Inbox: Vulnerabilities of Secure Email Gateways In an era where digital communication reigns supreme, email remains a cornerstone of modern business and personal correspondence. However,...

Learn More
Mar 04, 2024
0-Day Exploit Sales for Outlook and Jenkins, Insurance and Banking Dat...

0-Day Exploit Sales for Outlook and Jenkins, Insurance and Banking Data Leaks, and More Journey through the sinister realms of cyberspace with SOCRadar’s Dark Web Team. The sale of critical 0-day expl...

Learn More
Mar 04, 2024
Intelligence Pioneers: Meet the Top 10 CTI Experts

Intelligence Pioneers: Meet the Top 10 CTI Experts The expertise of Cyber Threat Intelligence (CTI) professionals is essential in strengthening digital defenses against ever-evolving threats. Within t...

Learn More
Mar 01, 2024
Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizati...

Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizations The pandemic has brought about radical changes in business models. Alongside digital transformation, the increased efficiency ...

Learn More
Mar 01, 2024
What is YARA, YARA v4.5.0 and YARA-X

What is YARA, YARA v4.5.0 and YARA-X Effective threat detection and analysis are essential for safeguarding digital assets in cybersecurity. YARA stands as a key tool in the arsenal of cybersecurity p...

Learn More
Mar 01, 2024
Exploring the Threat Landscape of Adversarial AI with MITRE ATLAS

Exploring the Threat Landscape of Adversarial AI with MITRE ATLAS Navigating the complex landscape of cybersecurity threats requires constant vigilance, especially with the rise of Artificial Intellig...

Learn More
Feb 29, 2024
DarkGate Malware: Exploring Threats and Countermeasures

DarkGate Malware: Exploring Threats and Countermeasures As we get increasingly digitized, the threat posed by malware has reached unprecedented levels in parallel. From individual users to large corpo...

Learn More
Feb 28, 2024
CISA’s Weekly Summary – CVSS 10 Vulnerabilities in Progress’ LoadMaste...

CISA’s Weekly Summary – CVSS 10 Vulnerabilities in Progress’ LoadMaster and OpenEdge, Myriad Critical Flaws [Update] March 29, 2024: “Threat Actors Exploit LoadMaster Vulnerability (CVE-2024-1212)” [U...

Learn More