Sep 04, 2023
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023 Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly ...

Learn More
Sep 04, 2023
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...

Learn More
Sep 01, 2023
Don't be Blinded by What You See: Demystifying Homograph Attacks

Don’t be Blinded by What You See: Demystifying Homograph Attacks ...

Learn More
Aug 31, 2023
QakBot, One of The Most Observed Malware

QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...

Learn More
Aug 28, 2023
Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & ...

Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & More Welcome to this week’s Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the...

Learn More
Aug 28, 2023
The Role of Threat Intelligence in Anti-Fraud Efforts

The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...

Learn More
Aug 28, 2023
Chain Reactions: Footprints of Major Supply Chain Attacks

Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs...

Learn More
Aug 28, 2023
Guarding the Gates: An Exploration of the Top Supply Chain Attacks

Guarding the Gates: An Exploration of the Top Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construction...

Learn More
Aug 25, 2023
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-...

A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-2023-41106 In the realm of digital communication and collaboration, Zimbra Collaboration Suite has been a trusted ally for many. H...

Learn More
Aug 25, 2023
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...

Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with...

Learn More
Aug 25, 2023
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Oth...

Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Other E-Commerce Sites Telekopye is a Telegram bot, named by combining the words Telegram and “kopye,” which means “spear...

Learn More
Aug 24, 2023
Navigating Cloud Vulnerabilities: Challenges and Solutions

Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...

Learn More
Aug 24, 2023
Raccoon Stealer Resurfaces with New Enhancements

Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...

Learn More
Aug 23, 2023
Top 10 DDoS Attacks

Top 10 DDoS Attacks While the concept of a “DDoS attack” might seem intricate, its core essence is actually relatively straightforward. A common strategy involves overwhelming a targeted s...

Learn More
Aug 23, 2023
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resi...

Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience In today’s rapidly evolving digital landscape, the term “cybersecurity” has become synonymous with safegu...

Learn More
Aug 22, 2023
Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Re...

Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Remote Code Execution in Juniper OS (CVE-2023-36844 through CVE-2023-36847) Published on August 17, 2023, a significant security bul...

Learn More
Aug 21, 2023
Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-20...

Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-2023-38035) [Update] August 25, 2023: See the subheadings: “Proof-of-Concept (PoC) Exploit Available for the Ivanti Sentry Zer...

Learn More
Aug 21, 2023
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild

On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild [Update] November 9, 2023: “End of an Era, the Sinking of Ransomed.VC” [Update] October 5, 2023: See the subheading: “RansomedVC De-ano...

Learn More
Aug 21, 2023
Dark Web Sales: Anti Red Page Service, France Phone Database, Leads fo...

Dark Web Sales: Anti Red Page Service, France Phone Database, Leads for Payment Processor The SOCRadar Dark Web Team continuously monitors the hidden corners of the dark web to uncover new incidents t...

Learn More
Aug 21, 2023
Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Trick...

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Info...

Learn More