Latest articles from SOCRadar
The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity experts. A patch was released on April Patch Tuesday for the vulnerability with CVE-2022-26809 and a CVSS score… Continue Reading
It’s easy to appreciate the importance hackers place on stolen bank accounts, credit cards, and social security numbers. Each of those products is a component of the ordinary person’s financial life. Its easy conversion to… Continue Reading
After the privacy policy scandal of WhatsApp in January 2021, Telegram was one of the trending apps to replace WhatsApp regarding its privacy policy. This situation makes Telegram more popular than ever before! Due to… Continue Reading
Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have changed irreversibly. Digitalization, which almost every industry has to adapt to, brought… Continue Reading
Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities. The security advisory stated that one of the two zero-days is being actively exploited. Zero-day exploited in the… Continue Reading
In time, the hacker underworld creates a similar model of Software-as-a-Service (SaaS). Malware as a service and SaaS have a similar duty with one main difference; MaaS is an unlawful version of SaaS. MaaS gives… Continue Reading
On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twitter account BlueHornet, which is associated with the group AgainstTheWest. The threat… Continue Reading
A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions. It is thought to have been downloaded more than 50,000 times. Expressed as a new version… Continue Reading
SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In addition, up-to-date notifications are provided for you to follow the spotlight actively. In… Continue Reading
Malaysia has rapidly integrated into the digital age with the rest of the world for the past few decades because of the exponential development of ICT infrastructure, and barely any citizen in Malaysia is unconnected… Continue Reading
The Netherlands is regarded as the technological gateway to Europe. The internet economy in the Netherlands, which currently accounts for more than six percent of the country's GDP, is expected to continue to grow in… Continue Reading
The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading
Lockbit Ransomware gang, also known as Bitwise Spider, are the cybercriminal masterminds behind the popular Lockbit Ransomware-as-a-service. They are one of the most active ransomware gangs with generally multiple victims per day, sometimes higher. On… Continue Reading
Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control business networks because it provides an exclusive field that could allow attackers to… Continue Reading
Threat actors are developing more advanced attack techniques every day. They even help non-technical attackers by publishing toolkits. With these toolkits, anyone can easily access victims' systems remotely, perform DDoS attacks or deploy ransomware. Borat,… Continue Reading
The Genesis Market is an automated online store that sells credentials, fingerprints, web platform vulnerabilities, cookies, and various sensitive data that assist cybercriminal hackers in gaining initial access into the targeted victim network. Security researchers… Continue Reading
A zero-day vulnerability that affects the Spring Core Java framework called Spring4Shell and allows RCE has been disclosed. Vulnerability coded as CVE-2022-22965 and rated as critical. Spring is a very popular framework for Java developers. This increases… Continue Reading
People increasingly purchase and sell items in the Internet's most obscure corners. Amazon, Shopify, Walmart, and eBay are all well-known e-commerce platforms. These are frequently the first internet stores where we purchase our goods. However,… Continue Reading
The Lapsus$ group, which started its activities a short time ago, managed to attract the whole world's attention. With their high-profile target and unconventional tactics and methods, are we just facing a "new player in… Continue Reading
The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomware rose to a level affecting the lives of ordinary people directly, thanks to the… Continue Reading