Shedding Light on the Ancient Continent: Insights from Southern Africa
Shedding Light on the Ancient Continent: Insights from Southern Africa Today’s online world is full of risks. Our report on cyber threats in Southern Africa is key for anyone wanting to protect their...
Google's Response to Pixel Zero-Days: CVE-2024-29745, CVE-2024-29748; ...
Google’s Response to Pixel Zero-Days: CVE-2024-29745, CVE-2024-29748; Chrome V8 Zero-Day, CVE-2024-3159 [Update] April 5, 2024: “CISA Urges Immediate Action on Pixel Zero-Day Vulnerabilities” Google ...
Critical OS Command Injection Flaw in Progress Flowmon: CVE-2024-2389
Critical OS Command Injection Flaw in Progress Flowmon: CVE-2024-2389 Progress disclosed a highly critical vulnerability, CVE-2024-2389, that affects the Flowmon product. Exploiting this vulnerability...
The Anatomy of Stealers: How Are They Stealing Our Information? Where ...
The Anatomy of Stealers: How Are They Stealing Our Information? Where Are They Taking It? The world of cyber security faces new and more complex threats every day. Among these threats, which we encoun...
How to Detect & Prevent Ransomware Attacks (2024 CISO Edition)
How to Detect & Prevent Ransomware Attacks (2024 CISO Edition) ...
What Do You Need to Know About the Linux XZ Utils Vulnerability, CVE-2...
What Do You Need to Know About the Linux XZ Utils Vulnerability, CVE-2024-3094? A researcher has identified a critical vulnerability in Linux’s XZ Utils, a command line tool for XZ format compression....
U.S. Faces Cyber Onslaught: Fico Breach, ID, CC, Military Data Sale
U.S. Faces Cyber Onslaught: Fico Breach, ID, CC, Military Data Sale Explore the latest dark web threats uncovered by SOCRadar’s Dark Web Team. From breaches affecting major corporations such as Fico t...
Top 10 Cybersecurity Books
Top 10 Cybersecurity Books With new threats and challenges emerging every day within the cybersecurity field, to stay ahead of the curve, it’s necessary to keep learning. One of the best ways to do th...
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists Newbie penetration testers often struggle to grasp the significance of the initial findings reported by most Dynamic Application Scann...
Cisco Fixes Numerous DoS Vulnerabilities in IOS, IOS XE, and Access Po...
Cisco Fixes Numerous DoS Vulnerabilities in IOS, IOS XE, and Access Point Software Cisco recently addressed multiple Denial-of-Service (DoS) vulnerabilities across its product range, including Cisco I...
The Importance of Supply Chain Security for Safeguarding Business Ecos...
The Importance of Supply Chain Security for Safeguarding Business Ecosystems In today’s interconnected digital ecosystem, the security of a single organization doesn’t solely depend on its internal de...
High-Severity Vulnerability in Popular WordPress Plugin ‘File Manager’...
High-Severity Vulnerability in Popular WordPress Plugin ‘File Manager’ Could Lead to CSRF Attacks (CVE-2024-1538) A high-severity security vulnerability, identified as CVE-2024-1538, has recently come...
CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security
CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security The Brazilian financial sector is facing a formidable cyber threat known as CHAVECLOAK, a banking trojan that has emerged as a signifi...
Unlock the Secrets to Safeguarding Your Digital Frontier: A Sneak Peek...
Unlock the Secrets to Safeguarding Your Digital Frontier: A Sneak Peek into the Singapore Threat Landscape In the ever-evolving realm of cybersecurity, knowledge is not just power—it’s your best defen...
OpenVPN Fixed Multiple Vulnerabilities on Windows Version: Risk of Pri...
OpenVPN Fixed Multiple Vulnerabilities on Windows Version: Risk of Privilege Escalation, Remote Access OpenVPN, with the release of a new version, addressed severe security vulnerabilities, specifical...
New DDoS Service, Windows 0-Day Exploit, and US Credit Cards Sale
New DDoS Service, Windows 0-Day Exploit, and US Credit Cards Sale Discover the latest findings by SOCRadar’s Dark Web Team. A new DDoS service promises extended attacks, challenging defenses from Clou...
Critical SQL Injection Vulnerability in PgJDBC Affects Atlassian Bambo...
Critical SQL Injection Vulnerability in PgJDBC Affects Atlassian Bamboo Data Center and Server (CVE-2024-1597) Atlassian recently patched a critical vulnerability and 24 high-severity vulnerabilities,...
Dark Web Profile: RansomHub
Dark Web Profile: RansomHub [Update] April 8, 2024: “From ALPHV to RansomHub: Change Healthcare” A new threat actor has emerged in the ransomware landscape, distinguishing themselves by making claims ...
Cybersecurity in the Skies: SOCRadar Aviation Industry Threat Landscap...
Cybersecurity in the Skies: SOCRadar Aviation Industry Threat Landscape Report The digital age has brought many wonders, including making air travel easier and more efficient than ever before. But, ju...
Critical RCEs: Ivanti Standalone Sentry (CVE-2023-41724), Neurons for ...
Critical RCEs: Ivanti Standalone Sentry (CVE-2023-41724), Neurons for ITSM (CVE-2023-46808), Telerik Report Server (CVE-2024-1800) [Update] March 22, 2024: “CISA Warns for the Vulnerabilities in Ivant...