
Password Dictionary Analysis: Ultimate Wordlist of USA Passwords
Password Dictionary Analysis: Ultimate Wordlist of USA Passwords In the digital age, where our lives are increasingly connected with technology, the importance of securing our online accounts cannot b...

Dark Peep #13: Money Laundering 1M1
Dark Peep #13: Money Laundering 1M1 Welcome to Dark Peep #13: Money Laundering 1M1, where the cyber landscape mirrors the shifting sands of the dark web, guided by the astute observations of SOCRadar ...

Biggest Cybersecurity Risks SMEs Face and CTI as a Solution
Biggest Cybersecurity Risks SMEs Face and CTI as a Solution Small and Medium Enterprises (SMEs) can be considered the engine of their country’s economies. Their efforts result in economic growth. The ...

Dark Web Profile: Akira Ransomware
Dark Web Profile: Akira Ransomware [Update] October 1, 2024: “What Are the Latest Akira News?” Since its discovery in early 2023, Akira ransomware has evolved from a seemingly ordinary addition to the...

In the Crosshairs: Top 10 Threat Actors Targeting the USA
In the Crosshairs: Top 10 Threat Actors Targeting the USA As the digital landscape continues to evolve, the United States finds itself at the forefront of emerging cybersecurity challenges. With its c...

Rise of Malicious AI Tools: A Case Study with HackerGPT
Rise of Malicious AI Tools: A Case Study with HackerGPT Artificial intelligence, particularly generative models, has become increasingly prevalent over the past few years. Its impact on the workforce ...

OpenMetadata Vulnerabilities Allow Attackers to Cryptomine in Kubernet...
OpenMetadata Vulnerabilities Allow Attackers to Cryptomine in Kubernetes Environments Recent findings from a Microsoft security blog reveal that attackers exploit newly discovered critical vulnerabili...

Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations
Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations We are all aware that reactive measures are insufficient in this age of cyber threats; businesses must take proactive steps to ef...

CVE-2024-21006 in Oracle WebLogic Server – Oracle’s April 2024 Update ...
CVE-2024-21006 in Oracle WebLogic Server – Oracle’s April 2024 Update Brings 441 New Security Patches Oracle has released its Critical Patch Update advisory for April 2024, which addresses vulnerabili...

Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in...
Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in Open Source Security Recent events have brought to light critical issues related to cybersecurity threats and social engineering ...

Ivanti Avalanche Received an Update for Over Two Dozen Vulnerabilities...
Ivanti Avalanche Received an Update for Over Two Dozen Vulnerabilities (CVE-2024-24996, CVE-2024-29204…) Ivanti has recently issued security updates to address multiple vulnerabilities in Avalanche. T...

Major Cyber Attacks in Review: March 2024
Major Cyber Attacks in Review: March 2024 March 2024 witnessed a wave of cyber attacks targeting prominent organizations globally. From telecommunications giants to government pension funds, several h...

Cyber Reflections of Iran's Attack on Israel
Cyber Reflections of Iran’s Attack on Israel [Update] April 22, 2024: “Israeli Hackers Strike Back: Cyber Av3ngers Hacked” [Update] April 17, 2024: “Ongoing Hacktivist Activities” On Saturday and earl...

José Ferreira's Insights on Elevating Healthcare Cybersecurity: Strate...
José Ferreira’s Insights on Elevating Healthcare Cybersecurity: Strategies and Challenges In a landscape where cyber threats constantly evolve and present new challenges, especially in critical ...

0-Day Exploits for Outlook and Windows, AnyDesk Access Sale, LeadSquar...
0-Day Exploits for Outlook and Windows, AnyDesk Access Sale, LeadSquared and WeRize Database Leaks Explore the latest cyber threats with SOCRadar Dark Web Team’s findings. Concerning posts on hacker f...

Critical PHP Vulnerabilities: Update Now to Prevent Takeovers and Comm...
Critical PHP Vulnerabilities: Update Now to Prevent Takeovers and Command Injection (CVE-2024-1874, CVE-2024-2756, CVE-2024-3096, CVE-2024-2757) The PHP development team recently announced security up...

Cybersecurity Implications of Deepfakes
Cybersecurity Implications of Deepfakes The year 2024 is an important year in cybersecurity. With fast developments in technology, cyber threats have evolved to use more modern tactics, such as deepfa...

Critical OS Command Injection Vulnerability in Palo Alto's GlobalProte...
Critical OS Command Injection Vulnerability in Palo Alto’s GlobalProtect Gateway: CVE-2024-3400. The patch is not available yet. [Update] April 17, 2024: “PoC Exploit Available for CVE-2024-3400: Rese...

ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI
ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI Stealer logs serve as the underground repositories of stolen data, filled with sensitive information such as payment card details and c...

Top 10 Dark Web Markets
Top 10 Dark Web Markets The dark web hosts markets like the internet’s Wild West. Sites like Silk Road and Nemesis have shown how deep this underworld goes. The shutdown of these platforms is a big wi...