Implementing Cyber Threat Intelligence in Software Development Lifecyc...
Implementing Cyber Threat Intelligence in Software Development Lifecycle (SDLC) Pipelines The process of creating, refining, and deploying software, encapsulated within the Software Development Lifecy...
Fact-Checking of Cyber Incidents and CTI as a Helper
Fact-Checking of Cyber Incidents and CTI as a Helper Nowadays, every article on information security starts with “In today’s rapidly evolving digital landscape,” but this time it is a really appropria...
Attackers Exploit Ivanti Connect Secure Zero-Day Vulnerabilities to De...
Attackers Exploit Ivanti Connect Secure Zero-Day Vulnerabilities to Deploy Webshells (CVE-2023-46805, CVE-2024-21887) [Update] May 8, 2024: Read under “Mirai Botnet Propagates by Exploiting Ivanti Vul...
Beyond Hacktivism: Deanon Club, KillNet, and the Russian Dark Web Mark...
Beyond Hacktivism: Deanon Club, KillNet, and the Russian Dark Web Market Wars In recent years, the Russian Dark Web has become a fierce battleground, particularly following the shutdown of Hydra, the ...
High Severity Vulnerability in Cisco Unity Connection Could Enable Roo...
High Severity Vulnerability in Cisco Unity Connection Could Enable Root Privileges (CVE-2024-20272) Cisco has resolved a high-severity security vulnerability in Unity Connection that opens the door fo...
CISA Warned of Critical Fortinet Vulnerability (CVE-2023-44250) and Is...
CISA Warned of Critical Fortinet Vulnerability (CVE-2023-44250) and Issued a New ICS Advisory In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) has urged users and adminis...
January 2024 – Microsoft Patch Tuesday & SAP Security Patch Day Highli...
January 2024 – Microsoft Patch Tuesday & SAP Security Patch Day Highlights Microsoft has released its January 2024 Patch Tuesday, addressing a total of 48 security vulnerabilities, with two classi...
The Persistent Threat of Ransomware: A 2023 Overview
The Persistent Threat of Ransomware: A 2023 Overview As we enter another year, the persistent threat of ransomware remains a critical concern for businesses and governments worldwide. SOCRadar’s compr...
Custom GPTs: A Case of Malware Analysis and IoC Analyzing
Custom GPTs: A Case of Malware Analysis and IoC Analyzing On November 6, 2023, CustomGPTs, a new feature that OpenAI stated on its blog, became available. We can already say that the emergence of Cust...
Cyber Siege: The Growing Threat to the US Healthcare
Cyber Siege: The Growing Threat to the US Healthcare Last week, the US healthcare sector faced a surge in cyber attacks, marking a troubling start to the year. This wave of incidents, from data breach...
Mastercard Data Leak, New Fully Undetectable Ransomware, Elusive Steal...
Mastercard Data Leak, New Fully Undetectable Ransomware, Elusive Stealer Source Code Leak, and More In recent discoveries across the cyber threat landscape, the SOCRadar Dark Web Team has identifi...
Your Data is Secure and Private with SOC 2 Type 2 Compliant SOCRadar
Your Data is Secure and Private with SOC 2 Type 2 Compliant SOCRadar We are pleased to share an important update regarding the security and privacy of your data with SOCRadar. Upholding the highest da...
Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Criti...
Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability, CVE-2023-39336 Ivanti has addressed a critical vulnerability in its Endpoint Manager (EPM) solution, identified...
CISA Issues ICS Advisories for Vulnerabilities Affecting Rockwell Auto...
CISA Issues ICS Advisories for Vulnerabilities Affecting Rockwell Automation, Mitsubishi Electric, and Unitronics CISA has issued three advisories on Industrial Control Systems (ICS), addressing the l...
2023 Dark Web Trends in SOCRadar Year-End Report
2023 Dark Web Trends in SOCRadar Year-End Report The cybersecurity landscape in 2023 underwent significant transformations, as evidenced by the SOCRadar 2023 End-of-Year Report. This comprehensive rep...
Sharpen Penetration Testing with Cyber Threat Intelligence
Sharpen Penetration Testing with Cyber Threat Intelligence We hope our readers are proficient with figures. Let’s dive into some statistics. In 2022, security incidents amounted to a stagg...
CISA Issues Alert for Juniper Secure Analytics Vulnerabilities (CVE-20...
CISA Issues Alert for Juniper Secure Analytics Vulnerabilities (CVE-2023-46604, CVE-2023-40787, CVE-2023-44487, and More) In a recent alert, the Cybersecurity and Infrastructure Security Agency (C...
National Credit Union Administration and GTA 5 Leaks, Craxs RAT, New W...
National Credit Union Administration and GTA 5 Leaks, Craxs RAT, New Windows Stealer The SOCRadar Dark Web Team has detected critical events, including the alleged Grand Theft Auto V source code leak ...
Dark Web Profile: Cactus Ransomware
Dark Web Profile: Cactus Ransomware A new plant has grown in the desert of cyber threats, wielding its thorns to pierce through organizations and individuals alike. The Cactus Ransomware Group, a name...
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privileg...
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain A recent Unit 42 investigation revealed a dual privilege escalation chain impacting Google Kubernetes E...