
Top 20 Free APIs for Cybersecurity: Threat Intelligence, Malware Analy...
Top 20 Free APIs for Cybersecurity: Threat Intelligence, Malware Analysis & More APIs matter because they serve as the glue that connects different software applications, enabling seamless communi...

X Faces Cyberattack: Dark Storm Team Takes Credit, Musk Blames Ukraine
X Faces Cyberattack: Dark Storm Team Takes Credit, Musk Blames Ukraine Yesterday, X (formerly Twitter) allegedly suffered a large-scale cyberattack, causing widespread outages. While Elon Musk claimed...

Top 20 Cybersecurity Conferences and Events to Attend in 2025
Top 20 Cybersecurity Conferences and Events to Attend in 2025 [Update] April 15, 2025: “19. BSidesNYC 2025 | October 18, 2025” As cyber threats become more complex, staying updated on the latest secur...

New Bank Log Service, TP-Link Zero-Day, Wizz Air Data Leak, and D2C Fr...
New Bank Log Service, TP-Link Zero-Day, Wizz Air Data Leak, and D2C Fraud Scheme Hacker forums continue to see a high level of cybercriminal activity, and this week, SOCRadar’s Dark Web Team dis...

Dark Web Profile: APT35
Dark Web Profile: APT35 APT35, also known as Charming Kitten, Phosphorus, Mint Sandstorm, and many other names, is an Iranian state-sponsored cyberwarfare group classified as an advanced persistent th...

Securing Your Browser Against Cross-Site Scripting (XSS) Attacks
Securing Your Browser Against Cross-Site Scripting (XSS) Attacks Cross-site scripting (XSS) is one of the most common web security vulnerabilities. Despite the fact that it is not frequently exploited...

Dark Peep #18: If It’s Easy for You, It’s Easy for Hackers
Dark Peep #18: If It’s Easy for You, It’s Easy for Hackers Some dark web stories are scary, some are shocking, and then there are the ones that make you go “Wait… what?” This is one of those. In this ...

Top 10 AI Deepfake Detection Tools to Combat Digital Deception in 2025
Top 10 AI Deepfake Detection Tools to Combat Digital Deception in 2025 Deepfake technology has advanced to the point where distinguishing real content from AI-generated media is becoming increasingly ...

Critical Kibana Vulnerability (CVE-2025-25012) Exposes Systems to Code...
Critical Kibana Vulnerability (CVE-2025-25012) Exposes Systems to Code Execution, Patch Now A critical security vulnerability has been discovered in Kibana, the widely used data visualization platform...

VMware Security Alert: Active Exploitation of Zero-Day Vulnerabilities...
VMware Security Alert: Active Exploitation of Zero-Day Vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) [Update] March 7, 2025: “37,000 VMware ESXi Servers Still Vulnerable t...

Dark Web Profile: Ghost (Cring) Ransomware
Dark Web Profile: Ghost (Cring) Ransomware In February 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI) and the Multi-...

Top 10 Free Vulnerability Intelligence Platforms
Top 10 Free Vulnerability Intelligence Platforms Cyber threats emerge every day, and keeping up with vulnerabilities is a constant challenge for security teams. Having reliable vulnerability intellige...

Navigating the Evolving Cyber Threats in the Finance Industry
Navigating the Evolving Cyber Threats in the Finance Industry In the ever-evolving world of cybersecurity, staying ahead of emerging threats is crucial—especially for the financial sector. The Finance...

Kenya’s Cyber Threat Landscape: The Rising Risks and How to Stay Ahead...
Kenya’s Cyber Threat Landscape: The Rising Risks and How to Stay Ahead Kenya’s digital economy is thriving, but with this growth comes an alarming surge in cyber threats. Businesses, government instit...

Latest Dark Web Findings: Discord Credentials, Orange Customer Records...
Latest Dark Web Findings: Discord Credentials, Orange Customer Records, and Australian Bank Data Once again, hacker forums are filled with new cyber threats, with SOCRadar’s Dark Web Team identifying ...

Inside the Dark Web Economy: Key Insights from SOCRadar's Annual Dark ...
Inside the Dark Web Economy: Key Insights from SOCRadar’s Annual Dark Web Report 2024 With cyber threats evolving and growing more sophisticated every year, the dark web remains a key hotspot fo...

Phishing Links in Browsers: Identifying Red Flags and Staying Safe
Phishing Links in Browsers: Identifying Red Flags and Staying Safe According to the FBI’s Internet Crime Report, scams resulted in over $12 billion in losses in 2023 alone, demonstrating how this digi...

How to Secure Your Mobile Banking App Against Keyloggers
How to Secure Your Mobile Banking App Against Keyloggers Mobile banking has become an essential part of daily life, offering convenience at our fingertips. With just a few taps, we can check balances,...

The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for ...
The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations Artificial intelligence (AI) has long been heralded as a force for innovation, revolutionizing industries and red...

23 Billion Rows of Stolen Records: What You Need to Know?
23 Billion Rows of Stolen Records: What You Need to Know? Update: What Does the Alleged Leak Data Contain? Infostealer malware continues to pose a severe threat, with billions of stolen records circul...