Ağu 24, 2023
Raccoon Stealer Resurfaces with New Enhancements

Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...

Learn More
Ağu 23, 2023
Top 10 DDoS Attacks

Top 10 DDoS Attacks While the concept of a “DDoS attack” might seem intricate, its core essence is actually relatively straightforward. A common strategy involves overwhelming a targeted s...

Learn More
Ağu 23, 2023
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resi...

Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience In today’s rapidly evolving digital landscape, the term “cybersecurity” has become synonymous with safegu...

Learn More
Ağu 22, 2023
Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Re...

Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Remote Code Execution in Juniper OS (CVE-2023-36844 through CVE-2023-36847) Published on August 17, 2023, a significant security bul...

Learn More
Ağu 21, 2023
Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-20...

Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-2023-38035) [Update] August 25, 2023: See the subheadings: “Proof-of-Concept (PoC) Exploit Available for the Ivanti Sentry Zer...

Learn More
Ağu 21, 2023
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild

On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild [Update] November 9, 2023: “End of an Era, the Sinking of Ransomed.VC” [Update] October 5, 2023: See the subheading: “RansomedVC De-ano...

Learn More
Ağu 21, 2023
Dark Web Sales: Anti Red Page Service, France Phone Database, Leads fo...

Dark Web Sales: Anti Red Page Service, France Phone Database, Leads for Payment Processor The SOCRadar Dark Web Team continuously monitors the hidden corners of the dark web to uncover new incidents t...

Learn More
Ağu 21, 2023
Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Trick...

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Info...

Learn More
Ağu 18, 2023
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files

Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram,...

Learn More
Ağu 17, 2023
What You Need to Know About Cisco Unified Communications Manager SQL I...

What You Need to Know About Cisco Unified Communications Manager SQL Injection Vulnerability (CVE-2023-20211) In today’s connected world, efficient tools like the Cisco Unified Communications Manager ...

Learn More
Ağu 17, 2023
The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Soft...

The Wolf in Sheep’s Clothing: How Cybercriminals Abuse Legitimate Software [Update] November 9, 2023: Added FBI’s notice, see under the title: “FBI Warns of Ransomware Threats via Th...

Learn More
Ağu 17, 2023
Dark Web Profile: Bjorka

Dark Web Profile: Bjorka In the ever-evolving landscape of cyber threats, understanding the profiles of individual threat actors is crucial for both governments and private organizations to take actio...

Learn More
Ağu 17, 2023
AnonFiles Forced to Shut Down Due to Surge of Malicious Utilization

AnonFiles Forced to Shut Down Due to Surge of Malicious Utilization [Update] August 18, 2023: The effects of the AnonFiles service’s closure have started coming into view. See the subheading: “C...

Learn More
Ağu 16, 2023
The Rising Anxiety Over LinkedIn Account Takeover Claims

The Rising Anxiety Over LinkedIn Account Takeover Claims In an age dominated by the digital, online platforms like LinkedIn have become vital components of our professional identities. But as we incre...

Learn More
Ağu 16, 2023
Possible Cyber Threats in the 2024 Olympics

Possible Cyber Threats in the 2024 Olympics The design of the Paris 2024 Olympic and Paralympic torch, introduced on July 25, 2023, struck the first gong for The Paris 2024 Summer Olympic and Paralymp...

Learn More
Ağu 16, 2023
Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32...

Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32560 Two critical vulnerabilities, collectively identified as CVE-2023-32560, have been discovered within Ivanti Avalanche, an ente...

Learn More
Ağu 15, 2023
SMS Bomber: How Dangerous Can a Text Be?

SMS Bomber: How Dangerous Can a Text Be? Among the ever-evolving threats in the world of cybersecurity, SMS Bomber attacks are emerging as a modern danger that can have significant and disturbing cons...

Learn More
Ağu 15, 2023
How Browser Sync Can Unknowingly Risk Your Business

How Browser Sync Can Unknowingly Risk Your Business An innocuous and maybe a hard worker employee sought to simplify their routines, inadvertently setting a sinister chain of events in motion; they ma...

Learn More
Ağu 15, 2023
Top 5 Dark Web Search Engines

Top 5 Dark Web Search Engines Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In this blog post, we delve into Dark Web search engines. Hidden from the ...

Learn More
Ağu 14, 2023
Evil-GPT Sale, Paramount Plus and Casio Data Leak & Unauthorized A...

Evil-GPT Sale, Paramount Plus and Casio Data Leak & Unauthorized Access Sales The SOCRadar Dark Web Team continuously uncovers incidents that endanger various entities by monitoring the hidden rec...

Learn More