Mastering Ransomware Negotiations: Unlock Critical Skills with SOCRada...
Mastering Ransomware Negotiations: Unlock Critical Skills with SOCRadar’s Expert Training Ransomware attacks have become a pressing concern for organizations of all sizes. Mastering the art of ransomw...
Dark Web Profile: OilRig (APT34)
Dark Web Profile: OilRig (APT34) OilRig, also known as APT34, is a state-sponsored Advanced Persistent Threat (APT) group with strong ties to Iranian intelligence. Known for its sophisticated cyber-es...
Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast...
Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast The cyber world is constantly changing. As technology advances, so do the threats that jeopardize organizations’ security. Decemb...
Major Cyberattacks Targeting Cryptocurrency & NFT Industry
Major Cyberattacks Targeting Cryptocurrency & NFT Industry The volatility of Bitcoin’s value and the wider cryptocurrency market not only draws traders and investors but also entices a varie...
IntelBroker Targets HPE, Carrefour France Leak, Nillious Android RAT
IntelBroker Targets HPE, Carrefour France Leak, Nillious Android RAT SOCRadar’s Dark Web Team has reported significant findings on hacker forums over the past week, including a range of high-profile d...
How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign
How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign Cybersecurity experts are sounding the alarm over a novel spear phishing campaign by the Russian state-sponsored group known as Star Bliz...
The Dark Web Economy: A Hidden Marketplace Reshaping Cybersecurity
The Dark Web Economy: A Hidden Marketplace Reshaping Cybersecurity In today’s digital landscape, cybersecurity isn’t just about sophisticated technical exploits anymore. The game has funda...
The Future of Biometric Authentication in Mobile Banking
The Future of Biometric Authentication in Mobile Banking Biometric authentication is a security mechanism that uses unique biological characteristics to verify a person’s identity. In the context of b...
FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitat...
FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitation [Update] January 18, 2025: “Fortinet’s Official Statement on the Breach” In a shocking development, the fallout from the...
Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructu...
Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure In recent months, Pumakit, a stealthy Linux rootkit, has emerged as a significant threat, targeting critical infrastructure acr...
Top 10 AI-Powered Cybersecurity Platforms
Top 10 AI-Powered Cybersecurity Platforms Artificial Intelligence (AI) has become a cornerstone in modern cybersecurity, transforming how organizations anticipate and respond to threats. At the same t...
From Hacktivists to Cyberterrorists: Understanding Modern Motivations
From Hacktivists to Cyberterrorists: Understanding Modern Motivations As digital infrastructure grows, the landscape of cyber threats has evolved in complexity and scope. What started as isolated inci...
January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SA...
January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SAP & Fortinet Updates [Update] January 16, 2025: “Growing Risk from CVE-2024-55591 as FortiGate Exploits Resurface” Microsoft h...
The Evolution of Ransomware: From Simple Encryption to Double Extortio...
The Evolution of Ransomware: From Simple Encryption to Double Extortion Tactics The evolution of ransomware represents one of the most significant transformations in the cybersecurity landscape over t...
An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerab...
An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerability (CVE-2025-0282) [Update] January 17, 2025: “PoC Exploit Released for Ivanti Connect Secure CVE-2025-0282 Vulnerability...
Dux Human Health Breach, U.S. Credit Card Sale, Boulanger Database Lea...
Dux Human Health Breach, U.S. Credit Card Sale, Boulanger Database Leak, and More SOCRadar’s Dark Web Team has monitored concerning activity on hacker forums over the past week, revealing significant ...
Major Cyber Attacks in Review: December 2024
Major Cyber Attacks in Review: December 2024 December 2024 saw a series of significant cyber attacks that targeted multiple industries, from healthcare to telecommunications. Ransomware groups like Bl...
Ivanti Zero-Day Exploited in Connect Secure, SonicWall SSL VPN and SSH...
Ivanti Zero-Day Exploited in Connect Secure, SonicWall SSL VPN and SSH Vulnerabilities, KerioControl Flaw [Update] January 10, 2024: “Recent Findings Reveal UNC5337 Exploiting Ivanti ICS Vulnera...
The Role of Cybersecurity in Protecting Critical Infrastructure: Focus...
The Role of Cybersecurity in Protecting Critical Infrastructure: Focus on Energy and Water Sectors Critical infrastructure serves as the foundation of modern society, encompassing the systems and asse...
End of the Year Report 2024: Uncovering Global Cyber Threats and Trend...
End of the Year Report 2024: Uncovering Global Cyber Threats and Trends As we close the chapter on 2024, the global cybersecurity landscape reveals a year of unprecedented challenges and transformativ...