Latest articles from SOCRadar
Atlassian announced that it has released an update for a critical vulnerability affecting its Confluence Server and Data Center products. The vulnerability, which allows unauthenticated actors to gain remote access, is tracked with the code… Continue Reading
In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal money, or transmit malware. How Does Spoofing Work? Spoofing often consists of… Continue Reading
Construction materials manufacturer Knauf announced it was the target of a cyberattack by the Black Basta ransomware. The company declared that some of its operations were interrupted due to the attack, and the IT team… Continue Reading
Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. Despite all these precautions, sometimes employees can fall victim to social engineering attacks due to unawareness and ignorance.… Continue Reading
Microsoft discovered a new zero-day vulnerability in Windows products and released a patch. The vulnerability lets attackers with a foothold already established on a targeted system run code with SYSTEM privileges. After the discovery, CISA… Continue Reading
CISA advised users and administrators to apply recently released fixes in Juniper Networks products due to several critical vulnerabilities and stated, "An attacker could exploit some of these vulnerabilities to take control of an affected system."… Continue Reading
As the most extensive worldwide system that stores information on everything (and almost everyone), the Internet comprises three distinct layers: the visible, the deep, and the dark web. Some layers contain significantly more information than… Continue Reading
Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks is very important. However, how can it be possible to reach the maximum potential of… Continue Reading
Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A SOC team requires reliable cyber threat intelligence to… Continue Reading
There are many hacker forums in the dark web world. Apart from the forums that first come to mind for illegal drug sales, human trafficking, and pornographic content, in this article, I will mainly talk about the… Continue Reading
The position of Chief Information Security Officer (CISO) is relatively new and has just received recognition from the CxO community and board of directors at the corporate level. To develop and demonstrate the significance of… Continue Reading
SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve their systems. SIEM, or security information and event management,… Continue Reading
One can find various sites inaccessible from the surface web on the dark web, including black markets, leak sites, hacker forums, and many more sites, all of which have diverse content. Sometimes to recruit new… Continue Reading
You can follow the major cyber security attacks of each month on SOCRadar's "Radar" page! We experienced critical days last month due to cyber-attacks in the developing and changing world. These attacks experienced by large and… Continue Reading
New Checkmate ransomware has been discovered targeting QNAP NAS devices. Although the attacks are still being investigated, it is known that these new ransomware attacks through SMB services are accessible via the internet. Checkmate utilizes… Continue Reading
In July 2021, a new Russian-speaking forum called RAMP, Russian Anonymous Market Place, which attracts a lot of interest from researchers and cybercriminals, was formed. The forum was launched on the same domain previously held,… Continue Reading
When Brute Ratel first appeared in the wild, almost no security solutions could detect it. To avoid being discovered by EDR and antivirus programs, hacking groups and ransomware operations are switching from Cobalt Strike to the more… Continue Reading
Hundreds of desktop applications and websites were compromised by an NPM supply chain attack that started in December 2021, using malicious NPM packages with obfuscated Javascript code. Researchers from ReversingLabs found that the attackers (named… Continue Reading
Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to well-crafted fake websites or malicious links using technics like social engineering. Passwords, financial information,… Continue Reading
RedAlert is a new ransomware operation aiming to encrypt Windows and Linux VMWare ESXi servers on corporate networks using the NTRUEncrypt public-key encryption algorithm. The ransomware is named after a string in the ransom text,… Continue Reading