Feb 14, 2024
Pipeline to Peril: Unpacking the ALPHV Attack on Trans-Northern

Pipeline to Peril: Unpacking the ALPHV Attack on Trans-Northern [Update] February 16, 2024: “US State Department’s Reward for Information on ALPHV/BlackCat Ransomware” In the ever-evolving lands...

Learn More
Feb 14, 2024
Microsoft’s February 2024 Patch Tuesday Highlights: CVE-2024-21412 and...

Microsoft’s February 2024 Patch Tuesday Highlights: CVE-2024-21412 and CVE-2024-21351 Under Exploitation [Update] February 7, 2025: “CVE-2024-21413 Added to CISA KEV Catalog Due to Exploitation&...

Learn More
Feb 14, 2024
Top Linux Bash Commands that SOC Analysts Should Know

Top Linux Bash Commands that SOC Analysts Should Know Within the domain of Cyber Threat Intelligence (CTI), where various tools and processes are deployed for vigilant defense, Bash commands are one s...

Learn More
Feb 13, 2024
Dark Web Profile: 3AM Ransomware

Dark Web Profile: 3AM Ransomware In late 2023, a new and distinct ransomware group named 3AM Ransomware emerged. It came to the forefront as a fallback for other ransomware, notably during failed depl...

Learn More
Feb 12, 2024
Unauthorized Fortinet VPN Access, Chrome Extension Loader, New macOS S...

Unauthorized Fortinet VPN Access, Chrome Extension Loader, New macOS Stealer, and More Explore the latest revelations from the SOCRadar Dark Web Team; our latest discoveries involve unauthorized VPN s...

Learn More
Feb 12, 2024
Major Cyber Attacks in Review: January 2024

Major Cyber Attacks in Review: January 2024 As January 2024 dawned, the digital atmosphere braced itself for another year’s cybersecurity challenges. Throughout the month, organizations experien...

Learn More
Feb 12, 2024
Dark Web Profile: Sandman APT

Dark Web Profile: Sandman APT The Sandman APT group has garnered massive attention in 2023 for its targeted attacks against telecommunications providers in regions including Europe and Asia. As reveal...

Learn More
Feb 09, 2024
Dark Bounty – From Out of Scope to Out of Interest

Dark Bounty – From Out of Scope to Out of Interest The digital realm thrives on the continuous push and pull between cybersecurity experts and malicious actors. Within this dynamic ecosystem, bug boun...

Learn More
Feb 09, 2024
RCEs in FortiOS SSL VPN, ‘shim’; Latest Ivanti Flaw Possibly Exploited...

RCEs in FortiOS SSL VPN, ‘shim’; Latest Ivanti Flaw Possibly Exploited (CVE-2024-21762, CVE-2023-40547, CVE-2024-22024) [Update] March 20, 2024: “Technical Documentation and Detailed Exploit Code on C...

Learn More
Feb 09, 2024
Retrospective – SOCRadar in 2023

Retrospective – SOCRadar in 2023 2023 has been a year we left behind with bitter and sweet memories. Although it will leave its mark on the long journey of humanity as a year marked by natural disaste...

Learn More
Feb 09, 2024
Cybersecurity Challenges in Indonesia’s 2024 Elections

Cybersecurity Challenges in Indonesia’s 2024 Elections ...

Learn More
Feb 08, 2024
How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway

How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway Organizations have increasingly moved significant portions of their operations online to streamline customer service processes. Inste...

Learn More
Feb 08, 2024
Cisco Fixed Critical CSRF Flaws in Expressway Gateways (CVE-2024-20252...

Cisco Fixed Critical CSRF Flaws in Expressway Gateways (CVE-2024-20252 and CVE-2024-20254) Cisco patched multiple security vulnerabilities, including critical ones, affecting its Expressway Series gat...

Learn More
Feb 08, 2024
Dark Peep #10: The Cold of Russia 2.0

Dark Peep #10: The Cold of Russia 2.0 Gear up, digital explorers! You’re about to dive into the latest edition of “Dark Peep #10” where we decode the mysteries of the cyber universe with a sprinkle of...

Learn More
Feb 07, 2024
Critical JetBrains TeamCity Authentication Bypass (CVE-2024-23917); CI...

Critical JetBrains TeamCity Authentication Bypass (CVE-2024-23917); CISA Adds Chrome Type Confusion to KEV (CVE-2023-4762) JetBrains recently discovered a critical authentication bypass vulnerability ...

Learn More
Feb 07, 2024
2024 Elections: Cybersecurity Challenges in Spain and Beyond

2024 Elections: Cybersecurity Challenges in Spain and Beyond As Spain prepares for its crucial 2024 European Parliament and local/municipal elections, the landscape of cybersecurity threats – from sop...

Learn More
Feb 06, 2024
Latest Vulnerabilities in FortiSIEM, Oracle WebLogic, Apache Tomcat: C...

Latest Vulnerabilities in FortiSIEM, Oracle WebLogic, Apache Tomcat: CVE-2024-23108, CVE-2024-23109, CVE-2024-20931, CVE-2024-21733 [Update] May 29, 2024: “PoC Exploit for Critical FortiSIEM Vulnerabi...

Learn More
Feb 06, 2024
Barracuda Disclosed Critical Vulnerabilities in WAF, Affecting File Up...

Barracuda Disclosed Critical Vulnerabilities in WAF, Affecting File Upload and JSON Protection Barracuda recently issued a security advisory confirming the presence of 7 security vulnerabilities, rang...

Learn More
Feb 06, 2024
Impact of CL0P Ransomware on the Cyber Threat Landscape in 2023: An An...

Impact of CL0P Ransomware on the Cyber Threat Landscape in 2023: An Analysis of Cyber Tactics and Threat Evolution Over the Year In the intricate web of cybersecurity threats, the CL0P ransomware grou...

Learn More
Feb 05, 2024
Using Threat Intelligence to Monitor Industry-Specific Threats

Using Threat Intelligence to Monitor Industry-Specific Threats Threat intelligence (TI) is essential to today’s cybersecurity practice because it enables organizations to gain insight into the motivat...

Learn More