Eki 03, 2023
Cloudflare Protection Bypass Vulnerability on Threat Actors' Radar

Cloudflare Protection Bypass Vulnerability on Threat Actors’ Radar Cloudflare, a leading cybersecurity provider, faces a security challenge due to vulnerabilities that could put its customer env...

Learn More
Eki 02, 2023
The "Evil" of Everything - Part II: Evilginx and EvilQR Rises AitM

The “Evil” of Everything – Part II: Evilginx and EvilQR Rises AitM In the ever-evolving landscape of cybersecurity threats, it is imperative to maintain vigilance and adaptability. ...

Learn More
Eki 02, 2023
The "Evil" of Everything - Part I: EvilProxy Rises AitM

The “Evil” of Everything – Part I: EvilProxy Rises AitM In today’s digital era, detecting a burgeoning type of cyberattack, known as Adversary-in-the-Middle (AiTM) attacks, is...

Learn More
Eki 02, 2023
Decrypting the Shadows: Revealing the Secrets of Ransomware Operators ...

Decrypting the Shadows: Revealing the Secrets of Ransomware Operators – An Interview with @htmalgae Meet @htmalgae, an anonymous security researcher with a wealth of experience in web applicatio...

Learn More
Eki 02, 2023
Windows 0-Day Exploit and RDP Access Sales, Database Leaks for Domasa ...

Windows 0-Day Exploit and RDP Access Sales, Database Leaks for Domasa City and Jeevess Ayurveda Threat actors persist in engaging in illicit activities within the enigmatic realm of the dark web. The ...

Learn More
Eki 02, 2023
Zero-Day Vulnerabilities in Exim Email Server: Risk of RCE (CVE-2023-4...

Zero-Day Vulnerabilities in Exim Email Server: Risk of RCE (CVE-2023-42115, CVE-2023-42116, CVE-2023-42117, and More) Zero Day Initiative disclosed a total of six zero-day vulnerabilities in the Exim ...

Learn More
Eyl 29, 2023
Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Inve...

Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Investments in Cyber Security We are delighted to present an exclusive interview with Nigel Simpson, Head of Global Cybersecurity for ...

Learn More
Eyl 29, 2023
3AM Ransomware: A Modern Threat with a Vintage Twist

3AM Ransomware: A Modern Threat with a Vintage Twist The 3AM ransomware group has recently been spotlighted for its cybercriminal activities. However, why it is the topic of the day is their choice of...

Learn More
Eyl 29, 2023
The Torrent Landscape: Understanding Security, Risks, and the Future

The Torrent Landscape: Understanding Security, Risks, and the Future In today’s digital age, the term “torrenting” often evokes images of pirated movies, music, or TV shows. However,...

Learn More
Eyl 29, 2023
‘Nightmangle’ Telegram C2 Agent and New FUD Crypter with Windows Defen...

‘Nightmangle’ Telegram C2 Agent and New FUD Crypter with Windows Defender Bypass [Update] October 5, 2023: See the subheading: “SPCRYPTER’s Latest Update: No More Trials.” Hackers favor Te...

Learn More
Eyl 29, 2023
WS_FTP Server Critical Vulnerabilities: What You Need to Know (CVE-202...

WS_FTP Server Critical Vulnerabilities: What You Need to Know (CVE-2023-40044, CVE-2023-42657) In the ever-changing landscape of cybersecurity, staying updated with current vulnerabilities is crucial....

Learn More
Eyl 28, 2023
New Campaign Distributes Malicious npm and PyPI Packages to Pilfer Kub...

New Campaign Distributes Malicious npm and PyPI Packages to Pilfer Kubernetes Config, SSH Keys Researchers have discovered a concerning surge in deceptive npm and PyPI packages distributed as part of ...

Learn More
Eyl 27, 2023
Critical Zero-Day Vulnerability in ‘libwebp’: CVE-2023-4863 Reassigned...

Critical Zero-Day Vulnerability in ‘libwebp’: CVE-2023-4863 Reassigned as CVE-2023-5129 [Update] October 18, 2023: See the subheading: “Fantom Foundation Breached: $550K Crypto Theft Linked to CVE-202...

Learn More
Eyl 27, 2023
Microsoft SharePoint Server Elevation of Privilege Vulnerability Explo...

Microsoft SharePoint Server Elevation of Privilege Vulnerability Exploit (CVE-2023-29357) [Update] January 11, 2024: “SharePoint Vulnerability Has Been Added to the KEV Catalog by CISA” [Update] Sept...

Learn More
Eyl 26, 2023
NIST Cybersecurity Framework 2.0: What You Need to Know

NIST Cybersecurity Framework 2.0: What You Need to Know In a previous SOCRadar blog post, we delved into the importance of cybersecurity frameworks for today’s organizations. In this installment, we p...

Learn More
Eyl 26, 2023
What You Need to Know About the Alleged Sony Breach

What You Need to Know About the Alleged Sony Breach The RansomedVC group has announced that it successfully breached Sony, the renowned Japanese multinational electronics giant. The group claims to ha...

Learn More
Eyl 26, 2023
New Botnet Sale and Recruitment Post, US and Canada RDP Access Sale, D...

New Botnet Sale and Recruitment Post, US and Canada RDP Access Sale, Dymocks Database In this week’s dark web update, the SOCRadar Dark Web Team has revealed a series of troubling developments; ...

Learn More
Eyl 25, 2023
TeamCity Authentication Bypass Flaw: CVE-2023-42793

TeamCity Authentication Bypass Flaw: CVE-2023-42793 [Update] December 14, 2023: See the subheading: “CISA Alerts on APT29 Exploiting TeamCity Vulnerability, CVE-2023-42793.”  [Update] October 6, 2023:...

Learn More
Eyl 25, 2023
Over 400K Buckets and 10.4B Files Are Public Due to Cloud Misconfigura...

Over 400K Buckets and 10.4B Files Are Public Due to Cloud Misconfigurations In today’s cloud-centric era, the migration of digital assets to cloud storage has become widespread, driven by the de...

Learn More
Eyl 22, 2023
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medic...

Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records In a regular threat and vulnerability hunting activity, SOCRadar has discovered during their research that thousands of...

Learn More