![](https://socradar.io/wp-content/uploads/2023/09/dont-be-blinded-by-what-you-see-demystifying-homograph-attacks.png)
Don't be Blinded by What You See: Demystifying Homograph Attacks
Don’t be Blinded by What You See: Demystifying Homograph Attacks ...
![](https://socradar.io/wp-content/uploads/2023/08/qakbot-one-of-the-most-observed-malware.png)
QakBot, One of The Most Observed Malware
QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...
![](https://socradar.io/wp-content/uploads/2023/08/ferrari-breach-8m-french-citizen-data-leak-jeeves-card-leak-and-more.png)
Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & ...
Ferrari Breach, 8.3M French Citizen Data Leak, Jeeves Card Leak & More Welcome to this week’s Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the...
![](https://socradar.io/wp-content/uploads/2023/10/the-role-of-threat-intelligence-in-anti-fraud-efforts.png)
The Role of Threat Intelligence in Anti-Fraud Efforts
The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...
![](https://socradar.io/wp-content/uploads/2023/08/chain-reactions-footprints-of-major-supply-chain-attacks.png)
Chain Reactions: Footprints of Major Supply Chain Attacks
Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs...
![](https://socradar.io/wp-content/uploads/2023/05/guarding-the-gates-an-exploration-of-the-top-10-supply-chain-attacks.png)
Guarding the Gates: An Exploration of the Top Supply Chain Attacks
Guarding the Gates: An Exploration of the Top Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construction...
![](https://socradar.io/wp-content/uploads/2022/08/over-1000-zimbra-servers-compromised-by-auth-bypass-vulnerability.png)
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-...
A One-Click Security Vulnerability in Zimbra Collaboration Suite: CVE-2023-41106 In the realm of digital communication and collaboration, Zimbra Collaboration Suite has been a trusted ally for many. H...
![](https://socradar.io/wp-content/uploads/2023/08/navigating-the-cyber-threat-landscape-with-socradars-vulnerability-intelligence-and-cveradar.png)
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...
Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with...
![](https://socradar.io/wp-content/uploads/2023/08/telekopye-telegram-bot-8-year-old-phisking-kit-mimicking-ebay-and-other-ecommerce-sites.png)
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Oth...
Telekopye Telegram Bot: 8 Year Old Phishing Kit Mimicking eBay and Other E-Commerce Sites Telekopye is a Telegram bot, named by combining the words Telegram and “kopye,” which means “spear...
![](https://socradar.io/wp-content/uploads/2023/08/navigating-cloud-vulnerabilities-challenges-and-solutions.png)
Navigating Cloud Vulnerabilities: Challenges and Solutions
Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...
![](https://socradar.io/wp-content/uploads/2023/08/raccoon-stealer-resurfaces-with-new-enhancements.png)
Raccoon Stealer Resurfaces with New Enhancements
Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...
![](https://socradar.io/wp-content/uploads/2023/08/top-10-ddos-attacks.png)
Top 10 DDoS Attacks
Top 10 DDoS Attacks While the concept of a “DDoS attack” might seem intricate, its core essence is actually relatively straightforward. A common strategy involves overwhelming a targeted s...
![](https://socradar.io/wp-content/uploads/2023/08/exploring-the-nist-cybersecurity-framework-strengthening-digital-resilience.png)
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resi...
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience In today’s rapidly evolving digital landscape, the term “cybersecurity” has become synonymous with safegu...
![](https://socradar.io/wp-content/uploads/2022/07/juniper-networks-released-fixes-for-critical-vulnerabilities.png)
Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Re...
Exploiting Multiple J-Web Vulnerabilities to Enable Unauthenticated Remote Code Execution in Juniper OS (CVE-2023-36844 through CVE-2023-36847) Published on August 17, 2023, a significant security bul...
![](https://socradar.io/wp-content/uploads/2023/08/ivanti-2.png)
Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-20...
Securing the Digital Gateways: The Ivanti Sentry Vulnerability (CVE-2023-38035) [Update] August 25, 2023: See the subheadings: “Proof-of-Concept (PoC) Exploit Available for the Ivanti Sentry Zer...
![](https://socradar.io/wp-content/uploads/2023/08/on-the-horizon-ransomed.vc-ransomware-group-spotted-in-the-wild.png)
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild [Update] November 9, 2023: “End of an Era, the Sinking of Ransomed.VC” [Update] October 5, 2023: See the subheading: “RansomedVC De-ano...
![](https://socradar.io/wp-content/uploads/2023/08/dark-web-sales-anti-red-page-service-france-phone-database-leads-for-payment-processor.png)
Dark Web Sales: Anti Red Page Service, France Phone Database, Leads fo...
Dark Web Sales: Anti Red Page Service, France Phone Database, Leads for Payment Processor The SOCRadar Dark Web Team continuously monitors the hidden corners of the dark web to uncover new incidents t...
![](https://socradar.io/wp-content/uploads/2023/08/mastering-the-art-of-monitoring-the-dark-web-for-cisos-tips-and-tricks.png)
Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Trick...
Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Info...
![](https://socradar.io/wp-content/uploads/2023/08/telegram-channels-unveiled-the-hidden-dangers-lurking-in-shared-files.png)
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a pop...
![](https://socradar.io/wp-content/uploads/2023/04/cisco-releases-patches-for-vulnerabilities-in-multiple-products-1.png)
What You Need to Know About Cisco Unified Communications Manager SQL I...
What You Need to Know About Cisco Unified Communications Manager SQL Injection Vulnerability (CVE-2023-20211) In today’s connected world, efficient tools like the Cisco Unified Communications Manager ...