
Dark Web Profile: Babuk/Babuk2
Dark Web Profile: Babuk/Babuk2 Babuk, originally emerging in 2020, became infamous for its ransomware attacks on large organizations and government agencies. After internal conflicts led to the leak o...

Critical Fortinet Vulnerability (CVE-2024-48887) Puts FortiSwitch Admi...
Critical Fortinet Vulnerability (CVE-2024-48887) Puts FortiSwitch Admin Credentials at Risk A newly disclosed critical vulnerability in Fortinet’s FortiSwitch product line is raising urgent security c...

April 2025 Patch Tuesday: Microsoft Addresses 126 Vulnerabilities Incl...
April 2025 Patch Tuesday: Microsoft Addresses 126 Vulnerabilities Including Actively Exploited CLFS Zero-Day Microsoft’s April 2025 Patch Tuesday brings an extensive set of updates aimed at shoring up...

Top 5 Threats to Mobile Banking Security and How to Avoid Them
Top 5 Threats to Mobile Banking Security and How to Avoid Them Mobile banking has become essential for convenient financial management in the digital age. However, this convenience also brings the ris...

April 2025 Android Update: Actively Exploited Kernel Bugs and Remote P...
April 2025 Android Update: Actively Exploited Kernel Bugs and Remote Privilege Escalation Threat Google has just released its April 2025 Android security bulletin, addressing a broad spectrum of vulne...

Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks
Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks A newly uncovered cyber campaign led by the Russian state-backed group Storm-2372 is exploiting device code phishing to bypass Mu...

Dark Web Sees New Market Launch, Credit Card and VPN Access Sales
Dark Web Sees New Market Launch, Credit Card and VPN Access Sales SOCRadar’s Dark Web Team has identified several new threats emerging on hacker forums in the last week. Highlights include the promoti...

UNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE ...
UNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE & BRUSHFIRE Malware A recently disclosed critical vulnerability in Ivanti products, CVE-2025-22457, has drawn urgent attention...

Everything You Need to Know About the Alleged Twilio SendGrid Breach
Everything You Need to Know About the Alleged Twilio SendGrid Breach [Update] April 9, 2025: “Alleged Breach Expands Beyond SendGrid” On April 3, 2025, a threat actor operating under the alias Satanic...

The Blogspot Based Phishing Attacks
The Blogpost Based Phishing Attacks Recently, the increase in Blogspot-based phishing sites has drawn attention. Threat actors are taking advantage of Blogspot’s free and seemingly reliable infrastruc...

Top 10 Dark Web Monitoring Tools
Top 10 Dark Web Monitoring Tools Imagine a place on the internet where rules don’t exist, identities are masked, and secrets are currency. Welcome to the dark web—a digital underworld where cybercrimi...

CrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): Wha...
CrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): What You Need to Know [Update] April 8, 2025: CISA Flags Actively Exploited CrushFTP Vulnerability (CVE-2025-31161) A newly discovere...

Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany
Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany This week, SOCRadar’s Dark Web Team uncovered several notable cyber threats circulating on hacker forums. Among the key findings are a...

Alleged Check Point Breach: What Happened and What You Need to Know?
Alleged Check Point Breach: What Happened and What You Need to Know? [Update] April 2, 2025: “Latest Developments: Dissecting CoreInjection’s Claims and the Alleged Leak” On March 31, 2025, a threat a...

Major Cyber Attacks Targeting Transportation & Logistics Industry
Major Cyber Attacks Targeting Transportation & Logistics Industry The global transportation and logistics industry is the backbone of modern commerce, enabling the smooth flow of goods and service...

Mozilla Responds to Critical Vulnerability: Urgent Firefox Update
Mozilla Responds to Critical Vulnerability: Urgent Firefox Update In a rapid response to a similar vulnerability with Google Chrome, Mozilla has issued an update for its Firefox browser on Windows to ...

Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharg...
Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharge Pentesting & Red Teaming In 2024, cybersecurity threats surged to unprecedented levels, with the average cost of a data brea...

Top 10 Dark Web Search Engines in 2025
Top 10 Dark Web Search Engines in 2025 A lot has changed since we last covered the top 5 Dark Web search engines. Some search engines are still around, while others have shut down or become unreliable...

NATO's Digital Frontiers Threat Landscape Report
NATO’s Digital Frontiers Threat Landscape Report In today’s interconnected world, the security of nations extends far beyond physical borders. The cyber domain has emerged as a critical ba...

Ingress Nightmare: Critical Unauthenticated Remote Code Execution Vuln...
Ingress Nightmare: Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress NGINX On March 24, 2025, the Kubernetes Security Response Committee released a patch for a set of high to c...