Mar 13, 2024
An Overview of Microsoft March 2024 Patch Tuesday: Severe RCE and Priv...

An Overview of Microsoft March 2024 Patch Tuesday: Severe RCE and Privilege Escalation Vulnerabilities Microsoft has released Patch Tuesday for March 2024, which addresses 61 security vulnerabilities....

Learn More
Mar 13, 2024
Top 10 Vulnerabilities on the Dark Web in 2023

Top 10 Vulnerabilities on the Dark Web in 2023 In the Dark Web, where cybercriminals and hackers converge to trade secrets and illicit goods, vulnerabilities can easily become weapons for many, and th...

Learn More
Mar 12, 2024
Dark Web Profile: Meow Ransomware

Dark Web Profile: Meow Ransomware In late 2022, 4 ransomware strains were discovered that are derived from Conti‘s leaked ransomware strain. One of them was Meow ransomware. The operation of this cryp...

Learn More
Mar 12, 2024
Critical CVE-2024-21899 Vulnerability in QNAP Products; Upcoming PoC E...

Critical CVE-2024-21899 Vulnerability in QNAP Products; Upcoming PoC Exploit for Outlook Vulnerability, CVE-2024-21378 QNAP recently addressed three vulnerabilities affecting their QTS, QuTS hero, QuT...

Learn More
Mar 11, 2024
Acuity Federal Contractor Breach, Okta Customers Leak, DCRat Exploit a...

Acuity Federal Contractor Breach, Okta Customers Leak, DCRat Exploit and Access Sales In the Dark Web, a world of illicit activities and cyber threats, the SOCRadar Dark Web Team has uncovered a serie...

Learn More
Mar 11, 2024
Operational Technology (OT) and Cybersecurity: Safeguarding Critical I...

Operational Technology (OT) and Cybersecurity: Safeguarding Critical Infrastructure Operational Technology (OT) encompasses hardware and software capable of detecting or inducing alterations in indust...

Learn More
Mar 11, 2024
Top 5 Paste Sites Used by Threat Actors

Top 5 Paste Sites Used by Threat Actors Paste sites are increasingly being utilized as hubs for disseminating code snippets, configuration files, and assorted textual data. While they offer valuable r...

Learn More
Mar 08, 2024
Critical Veritas NetBackup & JFrog Artifactory Vulnerabilities (CVE-20...

Critical Veritas NetBackup & JFrog Artifactory Vulnerabilities (CVE-2024-28222, CVE-2023-42662); CISA Alert for Cisco Flaws New critical vulnerabilities have surfaced in Veritas NetBackup and JFro...

Learn More
Mar 08, 2024
The Dangers of Third-Party App Stores: Risks and Precautions

The Dangers of Third-Party App Stores: Risks and Precautions When downloading applications, smartphone users typically consider the pre-installed Apple App Store or Google Play. However, there are oth...

Learn More
Mar 08, 2024
Dark Peep #12: The Ransomware Group That Never Was

Dark Peep #12: The Ransomware Group That Never Was Welcome to Dark Peep #12, where we dive into the latest cyber escapades reminiscent of tales from the Wild West. This edition is packed with stories ...

Learn More
Mar 07, 2024
How to Leverage Threat Intelligence in Incident Response

How to Leverage Threat Intelligence in Incident Response In the ever-evolving landscape of cybersecurity threats, incident response has become a crucial component of any organization’s defense s...

Learn More
Mar 07, 2024
Navigating the Shadowy Depths of the Migo Malware Campaign

Navigating the Shadowy Depths of the Migo Malware Campaign The Migo malware campaign emerged as a formidable adversary, targeting Redis servers with novel system-weakening techniques aimed at cryptoja...

Learn More
Mar 06, 2024
VMware ESXi, Workstation, Fusion Vulnerabilities Allow Code Execution,...

VMware ESXi, Workstation, Fusion Vulnerabilities Allow Code Execution, Sandbox Escape (CVE-2024-22252 – 22255) [Update] March 7, 2024: “CISA Urges Swift Patching of VMware Vulnerabilities” VMware has ...

Learn More
Mar 05, 2024
ALPHV's Roller Coaster, $22 Million Ransom

ALPHV’s Roller Coaster, $22 Million Ransom [Update] March 7, 2024: “Money Paid, Data Retained; ALPHV’s Exit Scam” The ransomware attack on Change Healthcare has become one of the most disruptive...

Learn More
Mar 05, 2024
TeamCity On-Premises Vulnerabilities Threaten Supply Chains (CVE-2024-...

TeamCity On-Premises Vulnerabilities Threaten Supply Chains (CVE-2024-27198, CVE-2024-27199); Android March 2024 Updates [Update] March 12, 2024: “BianLian Exploits JetBrains TeamCity Vulnerabilities ...

Learn More
Mar 04, 2024
Defending the Inbox: Vulnerabilities of Secure Email Gateways

Defending the Inbox: Vulnerabilities of Secure Email Gateways In an era where digital communication reigns supreme, email remains a cornerstone of modern business and personal correspondence. However,...

Learn More
Mar 04, 2024
0-Day Exploit Sales for Outlook and Jenkins, Insurance and Banking Dat...

0-Day Exploit Sales for Outlook and Jenkins, Insurance and Banking Data Leaks, and More Journey through the sinister realms of cyberspace with SOCRadar’s Dark Web Team. The sale of critical 0-day expl...

Learn More
Mar 04, 2024
Intelligence Pioneers: Meet the Top 10 CTI Experts

Intelligence Pioneers: Meet the Top 10 CTI Experts The expertise of Cyber Threat Intelligence (CTI) professionals is essential in strengthening digital defenses against ever-evolving threats. Within t...

Learn More
Mar 01, 2024
Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizati...

Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizations The pandemic has brought about radical changes in business models. Alongside digital transformation, the increased efficiency ...

Learn More
Mar 01, 2024
What is YARA, YARA v4.5.0 and YARA-X

What is YARA, YARA v4.5.0 and YARA-X Effective threat detection and analysis are essential for safeguarding digital assets in cybersecurity. YARA stands as a key tool in the arsenal of cybersecurity p...

Learn More