
Veeam Service Provider Console Affected by Severe RCE Vulnerability: C...
Veeam Service Provider Console Affected by Severe RCE Vulnerability: CVE-2024-29212 Veeam has recently disclosed a significant security vulnerability within Veeam Service Provider Console (VSPC), iden...

What is Invoice Fraud?
What is Invoice Fraud? Invoice fraud has become a rampant concern in today’s digitally-driven business environment. According to the 2024 AFP Payments Fraud and Control Survey Report, a staggering 80%...

Cybersecurity Challenges in 2024 Mexico’s Elections
Cybersecurity Challenges in 2024 Mexico’s Elections In Mexico, the general elections are scheduled for June 2, 2024. The nation’s decision will determine the new president who will govern the country ...

Nestle Brazil Leak, Rakuzan RAT, Access Sales for Japan & UAE Comp...
Nestle Brazil Leak, Rakuzan RAT, Access Sales for Japan & UAE Companies Embark on an exploration of the latest Dark Web revelations brought to light by the SOCRadar Dark Web Team. Last week’s find...

Become a Certified AI Master in Cybersecurity with SOCRadar Training
Become a Certified AI Master in Cybersecurity with SOCRadar Training In the fast-evolving realm of cybersecurity, staying ahead of threats requires not just understanding the latest technologies but m...

The Impact of Cyber Attacks on the Stock Markets
The Impact of Cyber Attacks on the Stock Markets Today, many companies offer their shares to the public, allowing them to be traded on the stock exchange. This provides several advantages for companie...

New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unaut...
New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114 A high-severity vulnerability, CVE-2024-32114, has been discovered in Apache ActiveMQ, potentially ...

Top 10 Free IoC Search & Enrichment Platforms
Top 10 Free IoC Search & Enrichment Platforms Indicators of Compromise (IoCs) are critical pieces of threat intelligence that identify potential breaches in an endpoint or network. These digital a...

Top 10 Takeaways from Verizon DBIR 2024 Report
Top 10 Takeaways from Verizon DBIR 2024 Report Verizon’s 17th annual Data Breach Investigations Report (DBIR) for 2024 offers an in-depth look at the latest trends in data breaches and cyber security ...

The Future of Passwordless Authentication in Cybersecurity
The Future of Passwordless Authentication in Cybersecurity Passwordless authentication is a validation method that eliminates the use of traditional passwords. Instead, it leverages alternative method...

Latin America Under Threat: The Venom RAT Campaign's Cyber Invasion In...
Latin America Under Threat: The Venom RAT Campaign’s Cyber Invasion Initiative In Latin America, there is a significant cyber threat posed by the Venom RAT campaign, necessitating swift and decisive a...

New iMessage 0-Day Exploit, U.S. Healthcare Breach, Access Sales &...
New iMessage 0-Day Exploit, U.S. Healthcare Breach, Access Sales & Dark Web Recruitment Posts Each day, fresh threats surface on the Dark Web. In the “The Week in the Dark Web” series,...

ShadowRay Campaign Exploits Critical Ray Framework Vulnerabilities to ...
ShadowRay Campaign Exploits Critical Ray Framework Vulnerabilities to Compromise AI Workloads Globally Since September 5, 2023, a sophisticated cyber threat named the ‘ShadowRay’ campaign has targeted...

Threat Actor Profile: Molerats
Threat Actor Profile: Molerats Much like mole rats create an intricate network of underground tunnels, the cyber threat group known as Molerats has expertly burrowed its way through the digital defens...

Could Your Email be Hacked? 2024 Analysis of Top Email Providers in St...
Could Your Email be Hacked? 2024 Analysis of Top Email Providers in Stealer Logs With the ever-present concern surrounding the security of email addresses and the accounts linked to them, there arises...

Dark Web Profile: Red Ransomware
Dark Web Profile: Red Ransomware On April 3, 2024, a newly discovered ransomware group surfaced as Senior Threat Analyst Rakesh Krishnan shed light. Known as Red CryptoApp, this group began its operat...

Beyond Phishing: Top 10 Data Breach Sets
Beyond Phishing: Top 10 Data Breach Sets In recent years, there has been a significant increase in the amount of sensitive data available, making cybercrime more of a risk even for people who aren’t v...

APT28 Deploys ‘GooseEgg’ in Attacks Exploiting the Windows Print Spool...
APT28 Deploys ‘GooseEgg’ in Attacks Exploiting the Windows Print Spooler Vulnerability, CVE-2022-38028 Microsoft recently shed light on a campaign orchestrated by the Russian-based threat actor Forest...

Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/i...
Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users The SOCRadar Dark Web Team recently discovered a leaked database containing sensitive customer information from Honda ...

Deciphering Cyber Shadows: Insights into China and Russia’s Cybercrime...
Deciphering Cyber Shadows: Insights into China and Russia’s Cybercrime Ecosystems In an era where cyber threats loom large over global security, understanding the operational dynamics within notorious...