![](https://socradar.io/wp-content/uploads/2024/06/an-overview-of-intelligence-requirements-in-cti.jpg)
An Overview of Intelligence Requirements in CTI
An Overview of Intelligence Requirements in CTI Security, in general, is a complex domain where you need to keep in mind a variety of factors. In a complex field like this, the role of intelligence ca...
![](https://socradar.io/wp-content/uploads/2024/06/tracking-down-notorious-ransomware-actors-with-socradar-2-0-1.jpg)
Tracking Down Notorious Ransomware Actors with CTI 2.0
Tracking Down Notorious Ransomware Actors with CTI 2.0 Alex was talking to his security team when his boss called him into his office one day. News about ransomware attacks across the industry has bee...
![](https://socradar.io/wp-content/uploads/2024/06/intelbroker-claims-apple-amd-data-breaches-nsa-data-allegedly-leaked.jpg)
IntelBroker Claims Apple, AMD Data Breaches; NSA Data Allegedly Leaked
IntelBroker Claims Apple, AMD Data Breaches; NSA Data Allegedly Leaked The SOCRadar Dark Web Team has uncovered several alarming posts on hacker forums, revealing significant breaches and data sales i...
![](https://socradar.io/wp-content/uploads/2024/06/ciso-guide-for-quantum-computing-risks-and-opportunities-part-i.png)
CISO Guide for Quantum Computing: Risks and Opportunities (Part I)
CISO Guide for Quantum Computing: Risks and Opportunities (Part I) For Chief Information Security Officers (CISOs) in charge of cybersecurity, quantum computing brings its paradox. It is both an oppor...
![](https://socradar.io/wp-content/uploads/2024/06/top-10-vpn-vulnerabilities-2022-h1-2024.jpg)
Top 10 VPN Vulnerabilities (2022 – H1 2024)
Top 10 VPN Vulnerabilities (2022 – H1 2024) In the landscape of cybersecurity, VPN security has become a critical concern for organizations worldwide. Compared to 2022, there was a staggering 47% incr...
![](https://socradar.io/wp-content/uploads/2024/06/dark-web-profile-dan0n-hacker-group.jpg)
Dark Web Profile: dAn0n Hacker Group
Dark Web Profile: dAn0n Hacker Group Global law enforcement agencies have ramped up their efforts against ransomware, leading to the weakening of groups and even dethroned the long ruled LockBit. Howe...
![](https://socradar.io/wp-content/uploads/2024/06/dark-web-profile-spacebears.jpg)
Dark Web Profile: SpaceBears
Dark Web Profile: SpaceBears Recent history could be termed the Age of Ransomware in the realm of cybercrime. However, threat actors have discovered a way to profit without the need for malware develo...
![](https://socradar.io/wp-content/uploads/2024/06/shedding-light-on-the-netherlands-threat-landscape-report.jpg)
Shedding Light on the Netherlands Threat Landscape Report
Shedding Light on the Netherlands Threat Landscape Report In an era of dynamic change in digital threats, there is more need for knowledge of regional cybersecurity challenges than ever. Therefore, it...
![](https://socradar.io/wp-content/uploads/2024/06/dark-web-profile-dragonforce-ransomware-1.jpg)
Dark Web Profile: DragonForce Ransomware
Dark Web Profile: DragonForce Ransomware DragonForce Ransomware has emerged as an intriguing adversary. Known for its prominent targets and unusual ways of communication, it has quickly gained notorie...
![](https://socradar.io/wp-content/uploads/2024/06/zero-day-exploits-for-windows-atlassian-mastodon-data-leak-ddos-attack-on-fc-bayern-munich.jpg)
Zero-Day Exploits for Windows, Atlassian, Mastodon Data Leak, DDoS Att...
Zero-Day Exploits for Windows, Atlassian, Mastodon Data Leak, DDoS Attack on FC Bayern Munich The SOCRadar Dark Web Team has recently uncovered several alarming posts on hacker forums and Telegram cha...
![](https://socradar.io/wp-content/uploads/2024/06/vmware-vcenter-server-updates-address-critical-rce-and-privilege-escalation-vulnerabilities-cve-2024-37079-cve-2024-37080-cve-2024-37081-scaled-e1718704509402.jpg)
VMware vCenter Server Updates Address Critical RCE and Privilege Escal...
VMware vCenter Server Updates Address Critical RCE and Privilege Escalation Vulnerabilities (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) Broadcom has released a security update for its popular man...
![](https://socradar.io/wp-content/uploads/2024/06/global-ddos-attack-landscape-insights-from-q1-2024.jpg)
Global DDoS Attack Landscape: Insights from Q1 2024
Global DDoS Attack Landscape: Insights from Q1 2024 Distributed Denial of Service (DDoS) attacks continue to escalate in frequency and complexity, posing significant threats across various sectors, pa...
![](https://socradar.io/wp-content/uploads/2024/06/top-10-cybersecurity-conferences.jpg)
Top 10 Cybersecurity Conferences
Top 10 Cybersecurity Conferences In the dynamic and ever-evolving world of cybersecurity, certain events stand as pillars of knowledge exchange and innovation. These gatherings, many of which have bee...
![](https://socradar.io/wp-content/uploads/2024/06/phishing-in-2024-4151-increase-since-launch-of-chatgpt-ai-mitigation-methods.jpg)
Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigati...
Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods Phishing remains a major threat in cybersecurity, with attacks growing more frequent and sophisticated each year. In 20...
![](https://socradar.io/wp-content/uploads/2024/06/cyber-threats-targeting-the-hajj-season.jpg)
Cyber Threats Targeting the Hajj Season
Cyber Threats Targeting the Hajj Season Hajj is a religious obligation for Muslims, which must be completed at least once in their lifetime by all adults who are physically and financially able to mak...
![](https://socradar.io/wp-content/uploads/2024/06/microsofts-june-2024-patch-tuesday-highlights-keytrap-zero-day-critical-msmq-flaw-windows-lpe-exploit.jpg.jpg)
Microsoft’s June 2024 Patch Tuesday Highlights KeyTrap Zero-Day, Criti...
Microsoft’s June 2024 Patch Tuesday Highlights KeyTrap Zero-Day, Critical MSMQ Flaw; Windows LPE Exploit Microsoft has released the June 2024 Patch Tuesday updates, aiming to fortify Microsoft product...
![](https://socradar.io/wp-content/uploads/2024/06/libraries-for-red-teaming-your-genai-applications.jpg)
Libraries for Red Teaming Your GenAI Applications
Libraries for Red Teaming Your GenAI Applications It is critical to ensure the security and integrity of Generative AI (GenAI) applications. Red teaming these applications entails proactively identify...
![](https://socradar.io/wp-content/uploads/2024/06/major-cyber-attacks-in-review-may-2024.jpg)
Major Cyber Attacks in Review: May 2024
Major Cyber Attacks in Review: May 2024 May 2024 saw several major cyber attacks across diverse sectors, including cryptocurrency, cloud services, and online archives. Notable incidents include the $3...
![](https://socradar.io/wp-content/uploads/2024/06/malvertising-campaign-targets-windows-administrators-using-putty-and-winscp.jpg)
Malvertising Campaign Targets Windows Administrators Using PuTTy and W...
Malvertising Campaign Targets Windows Administrators Using PuTTy and WinSCP An AI illustration of the malvertising campaign using PuTTy and WinSCP In the ever-evolving landscape of digital security...
![](https://socradar.io/wp-content/uploads/2024/06/ciso-guide-to-deepfake-scams-1.jpg)
CISO Guide to Deepfake Scams
CISO Guide to Deepfake Scams Initially perceived as a novelty, deepfakes have evolved into sophisticated fraud, misinformation, and manipulation tools. Utilizing artificial intelligence and machine le...