Jan 30, 2024
Cybersecurity Predictions: What Trends Will Be Prevalent in 2024?

Cybersecurity Predictions: What Trends Will Be Prevalent in 2024? The evolving digital environment and expanding attack surface demand vigilant adaptation to stay one step ahead of adversaries. Recogn...

Learn More
Jan 29, 2024
A for APT: Criteria for Classifying Cyber Threats

A for APT: Criteria for Classifying Cyber Threats The term “Advanced Persistent Threat” (APT) has emerged as a critical concept, necessitating a nuanced understanding and accurate classification. APTs...

Learn More
Jan 29, 2024
Atlassian’s Confluence Data Center and Server Affected by Critical RCE...

Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability, CVE-2023-22527: Patch Now [Update] August 29, 2024: “Cryptojacking via CVE-2023-22527” [Update] January 25, 2024: ...

Learn More
Jan 29, 2024
Top 10 RCE Vulnerabilities Exploited in 2023

Top 10 RCE Vulnerabilities Exploited in 2023 Cybersecurity unfolds in a continuous interplay between defenders and threat actors – an ever-evolving quest for software vulnerabilities, with both partie...

Learn More
Jan 29, 2024
EU & US Credit Cards, 750M Indian Mobile Data at Risk; Subway Hit by L...

EU & US Credit Cards, 750M Indian Mobile Data at Risk; Subway Hit by LockBit The SOCRadar Dark Web Team identified critical incidents in the cyber threat landscape over the last week. These includ...

Learn More
Jan 26, 2024
Securing the Chain: How Threat Intelligence Strengthens Third-Party Ri...

Securing the Chain: How Threat Intelligence Strengthens Third-Party Risk Management Businesses increasingly face new cybersecurity incidents that are disruptive, costly, and can significantly damage t...

Learn More
Jan 26, 2024
Russian APT Operation: Star Blizzard

Russian APT Operation: Star Blizzard [Update] January 30, 2024: “Official Attributions of Star Blizzard” Within the continuously changing cyber threat landscape, the strategies of Star Blizzard unfold...

Learn More
Jan 26, 2024
Critical RCE Vulnerability in Cisco Unified Communications with Risk o...

Critical RCE Vulnerability in Cisco Unified Communications with Risk of Root Access (CVE-2024-20253) The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting Cisco ...

Learn More
Jan 26, 2024
A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Ons...

A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Onslaught As we reflect on the cybersecurity journey of 2023, we uncover valuable lessons that shape our understanding of the ever-ch...

Learn More
Jan 26, 2024
Dark Peep #9: The McFlurry Bandit

Dark Peep #9: The McFlurry Bandit Welcome to “Dark Peep #9.” This edition takes you behind the scenes of the digital world, where every byte tells a story. Here, we uncover the ongoing sagas of cyberc...

Learn More
Jan 25, 2024
Stealer Malware 101: Understanding the Different Variants and Families

Stealer Malware 101: Understanding the Different Variants and Families In the realm of cybersecurity, malicious software (malware) continues to evolve, with various types targeting sensitive data for ...

Learn More
Jan 25, 2024
Writing YARA Rules with Custom GPTs and SOCRadar Platform

Writing YARA Rules with Custom GPTs and SOCRadar Platform YARA rules stand out as essential instruments for identifying and classifying malware. These rules are indispensable for cybersecurity profess...

Learn More
Jan 24, 2024
Critical Jenkins CLI File Read Vulnerability Could Lead to RCE Attacks...

Critical Jenkins CLI File Read Vulnerability Could Lead to RCE Attacks (CVE-2024-23897) [Update] August 20, 2024: “Critical Jenkins Vulnerability Added to CISA’s Known Exploited Vulnerabilities Catalo...

Learn More
Jan 24, 2024
Dark Web Profile: Malek Team

Dark Web Profile: Malek Team In recent months, the Malek Team, a hacker group with alleged links to Iran, has escalated its cyber offensive against key Israeli institutions, marking a significant upti...

Learn More
Jan 24, 2024
Critical Auth Bypass in GoAnywhere MFT: Is It a New Ransomware Gateway...

Critical Auth Bypass in GoAnywhere MFT: Is It a New Ransomware Gateway? (CVE-2024-0204) Fortra has disclosed a critical vulnerability in its GoAnywhere MFT (Managed File Transfer) software – an authen...

Learn More
Jan 24, 2024
Dark Web Profile: INC Ransom

Dark Web Profile: INC Ransom The digital world is constantly under the threat of cyber attacks, and the emergence of new ransomware groups only intensifies this peril. One such group that has recently...

Learn More
Jan 23, 2024
Sensitive Information in APIs and Secure Usage of Postman

Sensitive Information in APIs and Secure Usage of Postman One of the developers’ most frequently used tools in software development is undoubtedly Postman. But what exactly are API and Postman, and ho...

Learn More
Jan 23, 2024
What is SIM Swapping?

What is SIM Swapping? SIM swapping attacks have emerged as a formidable and increasingly prevalent challenge in the ever-evolving cyber landscape. This sophisticated form of cybercrime involves attack...

Learn More
Jan 23, 2024
New Apple Zero-Day in WebKit Received a Fix (CVE-2024-23222)

New Apple Zero-Day in WebKit Received a Fix (CVE-2024-23222) [Update] January 24, 2024: “Apple WebKit Zero-Day CVE-2024-23222 Enters CISA KEV Catalog” Apple has issued security updates to address the ...

Learn More
Jan 22, 2024
A Year of Vigilance and Innovation, Triumphs of CISA in 2023

A Year of Vigilance and Innovation, Triumphs of CISA in 2023 In its fifth year on the cybersecurity frontier since its establishment in 2018, the Cybersecurity and Infrastructure Security Agency (CISA...

Learn More