Blog

Latest articles from SOCRadar

Ten Things Will Change Cybersecurity in 2023
September 23, 2022

Ten Things Will Change Cybersecurity in 2023

Businesses come across more significant cybersecurity challenges as technology evolves. The digital environment and the attack surface are changing every single day. Thus, the significance of knowing when to change priorities cannot be overstated. It… Continue Reading

A New Attack Wave Targeting Critical Magento Vulnerability
September 23, 2022

A New Attack Wave Targeting Critical Magento Vulnerability

E-commerce platform Magento has become a frequent target for hackers. More attempts have been made to exploit CVE-2022-24086 since its proof-of-concept was made available. The critical vulnerability is present in Magento 2, and it allows unauthenticated attackers to execute… Continue Reading

CISA Urges to Patch ManageEngine Against RCE Vulnerability
September 23, 2022

CISA Urges to Patch ManageEngine Against RCE Vulnerability

CISA has added a new critical vulnerability to its Known Exploited Vulnerabilities Catalog. The flaw exists in several ManageEngine products from Zoho and can lead to remote code execution on unpatched instances. The flaw, identified as CVE-2022-35405,… Continue Reading

Top 10 Threat Intelligence Resources to Follow
September 22, 2022

Top 10 Threat Intelligence Resources to Follow

Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there has been an explosion of prospective information sources providing incredible data.… Continue Reading

Python Flaw Unfixed for 15 Years: 350,000 Projects Deemed Vulnerable
September 22, 2022

Python Flaw Unfixed for 15 Years: 350,000 Projects Deemed Vulnerable

A flaw in the Python tarfile module has gone unfixed for 15 years. 350,000 open-source projects are considered vulnerable. The flaw is tracked as CVE-2007-4559; it is a directory traversal vulnerability that allows to read and… Continue Reading

Threat Actors Exploit Atlassian Confluence RCE Vulnerability to Install Crypto Miners
September 22, 2022

Threat Actors Exploit Atlassian Confluence RCE Flaw to Install Crypto Miners

Unpatched Atlassian Confluence Server instances are vulnerable to a critical RCE flaw. The flaw, tracked as CVE-2022-26134 (CVSS score: 9.8), is actively exploited by hackers for crypto mining purposes.  The vulnerability, once exploited, could result in various attack… Continue Reading

Top 10 Free Cybersecurity Solutions for SMB
September 21, 2022

Top 10 Free Cybersecurity Solutions for SMB

Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just the largest companies, everyone must have effective solutions and a thorough cybersecurity strategy. Whether… Continue Reading

$162M Stolen from Digital Asset Trader Wintermute
September 21, 2022

$162M Stolen from Digital Asset Trader Wintermute

Evgeny Gaevoy, the CEO of Wintermute, said earlier today that the company had been hacked and had lost $162.2 million in DeFi operations.  The Profanity tool was used to create the compromised Wintermute wallet. Wintermute… Continue Reading

Cobalt Strike Rolls Out an Update for XSS Vulnerability
September 21, 2022

Cobalt Strike Rolls Out an Update for XSS Vulnerability

Cobalt Strike 4.7.1 out-of-band update fixed an issue in version 4.7 that the affected users reported. There was no workaround for the problem. A vulnerability revealed soon after the 4.7 release was also addressed by… Continue Reading

Highlights from SOCRadar Cyberwatch September Webinar
September 20, 2022

Highlights from SOCRadar Cyberwatch September Webinar

The first of SOCRadar's Cyberwatch webinar series took place yesterday. Cyberwatch September, which covers significant cyber incidents, emerging threat actors, the most exploited vulnerabilities, and major cyberattacks worldwide, aims to provide actionable intelligence to cyber… Continue Reading

Microsoft and VMware Warn of Ongoing Chromeloader Malware Campaign
September 20, 2022

Microsoft and VMware Warn of Ongoing Chromeloader Malware Campaign

Microsoft and VMware cautioned users about a widely spread Chromeloader malware campaign. The malware is said to have evolved and become more threatening. Microsoft has posted an alert on Twitter about an active click fraud campaign that utilized Chromeloader, attributed to… Continue Reading

September 20, 2022

The Week in Dark Web – 20 September 2022 – Data Leaks

Powered by DarkMirror™ Last week, threat actors continued selling leaked government and private organizations' databases. The most notable leaks are about the Indonesian government. These leaks seem like a part of the cyber-attack series targeting… Continue Reading

Diplomatic Crisis: Cyber Attack from Iran to Albania
September 19, 2022

Diplomatic Crisis: Cyber Attack from Iran to Albania

On September 7, Edi Rama -the Prime Minister of Albania- released a video message on the website of the Government of Albania. According to the video message, Prime Minister Rama requested all diplomatic, technical, and… Continue Reading

Why are Threat Actors Targeting Indonesia?
September 16, 2022

Why are Threat Actors Targeting Indonesia?

On September 3, Indonesia hiked fuel prices by 30%, stating that petrol and diesel prices are still low by world standards, but subsidies are unsustainable. On the other hand, in the background of political decisions… Continue Reading

Trend Micro Warnes for Actively Exploited RCE Flaw in Apex One
September 16, 2022

Trend Micro Warnes for Actively Exploited RCE Flaw in Apex One

Trend Micro recently released a patch for an actively exploited flaw in its endpoint security platform, Apex One. The security software provider published an advisory to report six vulnerabilities and advised their customers to apply the patches… Continue Reading

Hacker Breached Nearly Entire Uber IT System
September 16, 2022

Hacker Breached Nearly Entire Uber IT System

Transportation provider giant Uber is currently investigating a cyberattack. Following a network intrusion, multiple instances used by the company have been compromised. Uber announced on Twitter that they are working with law enforcement to address the issue.… Continue Reading

WordPress Sites Compromised Due to FishPig Supply Chain Attack
September 15, 2022

WordPress Sites Compromised Due to FishPig Supply Chain Attack

Numerous attack scenarios were observed targeting WordPress recently. These attacks abused WordPress plugins and tools to exploit websites. Threat actors infected FishPig's distribution server as part of a supply chain attack. The vendor's service integrates Adobe's… Continue Reading

Italy Threat Landscape Report: Skyrocketing Data Theft
September 15, 2022

Italy Threat Landscape Report: Skyrocketing Data Theft

Cyber risks have reached a level that all organizations cannot ignore. All governments worldwide are taking measures to take action against potential cyber-attacks. Italy is one of them. Announcing its National Cybersecurity Strategy for the… Continue Reading

Cybersecurity Reports Worth Checking Out in 2022
September 14, 2022

Cybersecurity Reports Worth Checking Out in 2022

Cyberthreats evolve every second, making it impossible to forecast the state in the future. We need insights to understand how important it is to maintain and strengthen the current security policies. Statistical reports help stay… Continue Reading

Loader Malware Emotet is Now Led by Quantum and BlackCat
September 14, 2022

Loader Malware Emotet is Now Led by Quantum and BlackCat

Emotet (also known as SpmTools) is a sophisticated, modular banking trojan. Emotetmostly serves as a downloader or dropper of other banking trojans. It is a loader-as-a-service (LaaS). It is mainly distributed by spam emails (malspam). Malicious… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo