
The Anatomy of Stealers: How Are They Stealing Our Information? Where ...
The Anatomy of Stealers: How Are They Stealing Our Information? Where Are They Taking It? The world of cyber security faces new and more complex threats every day. Among these threats, which we encoun...

How to Detect & Prevent Ransomware Attacks (2024 CISO Edition)
How to Detect & Prevent Ransomware Attacks (2024 CISO Edition) ...

What Do You Need to Know About the Linux XZ Utils Vulnerability, CVE-2...
What Do You Need to Know About the Linux XZ Utils Vulnerability, CVE-2024-3094? A researcher has identified a critical vulnerability in Linux’s XZ Utils, a command line tool for XZ format compression....

U.S. Faces Cyber Onslaught: Fico Breach, ID, CC, Military Data Sale
U.S. Faces Cyber Onslaught: Fico Breach, ID, CC, Military Data Sale Explore the latest dark web threats uncovered by SOCRadar’s Dark Web Team. From breaches affecting major corporations such as Fico t...

Top 10 Cybersecurity Books
Top 10 Cybersecurity Books With new threats and challenges emerging every day within the cybersecurity field, to stay ahead of the curve, it’s necessary to keep learning. One of the best ways to do th...

Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists Newbie penetration testers often struggle to grasp the significance of the initial findings reported by most Dynamic Application Scann...

Cisco Fixes Numerous DoS Vulnerabilities in IOS, IOS XE, and Access Po...
Cisco Fixes Numerous DoS Vulnerabilities in IOS, IOS XE, and Access Point Software Cisco recently addressed multiple Denial-of-Service (DoS) vulnerabilities across its product range, including Cisco I...

The Importance of Supply Chain Security for Safeguarding Business Ecos...
The Importance of Supply Chain Security for Safeguarding Business Ecosystems In today’s interconnected digital ecosystem, the security of a single organization doesn’t solely depend on its internal de...

High-Severity Vulnerability in Popular WordPress Plugin ‘File Manager’...
High-Severity Vulnerability in Popular WordPress Plugin ‘File Manager’ Could Lead to CSRF Attacks (CVE-2024-1538) A high-severity security vulnerability, identified as CVE-2024-1538, has recently come...

CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security
CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security The Brazilian financial sector is facing a formidable cyber threat known as CHAVECLOAK, a banking trojan that has emerged as a signifi...

Unlock the Secrets to Safeguarding Your Digital Frontier: A Sneak Peek...
Unlock the Secrets to Safeguarding Your Digital Frontier: A Sneak Peek into the Singapore Threat Landscape In the ever-evolving realm of cybersecurity, knowledge is not just power—it’s your best defen...

OpenVPN Fixed Multiple Vulnerabilities on Windows Version: Risk of Pri...
OpenVPN Fixed Multiple Vulnerabilities on Windows Version: Risk of Privilege Escalation, Remote Access OpenVPN, with the release of a new version, addressed severe security vulnerabilities, specifical...

New DDoS Service, Windows 0-Day Exploit, and US Credit Cards Sale
New DDoS Service, Windows 0-Day Exploit, and US Credit Cards Sale Discover the latest findings by SOCRadar’s Dark Web Team. A new DDoS service promises extended attacks, challenging defenses from Clou...

Critical SQL Injection Vulnerability in PgJDBC Affects Atlassian Bambo...
Critical SQL Injection Vulnerability in PgJDBC Affects Atlassian Bamboo Data Center and Server (CVE-2024-1597) Atlassian recently patched a critical vulnerability and 24 high-severity vulnerabilities,...

Dark Web Profile: RansomHub
Dark Web Profile: RansomHub [Update] January 22, 2025: “What Has Changed In A Year?” [Update] June 6, 2024: “RansomHub Adds ZeroLogon Vulnerability to Its Arsenal” [Update] April 8, 2024: “From ALPHV...

Cybersecurity in the Skies: SOCRadar Aviation Industry Threat Landscap...
Cybersecurity in the Skies: SOCRadar Aviation Industry Threat Landscape Report The digital age has brought many wonders, including making air travel easier and more efficient than ever before. But, ju...

Critical RCEs: Ivanti Standalone Sentry (CVE-2023-41724), Neurons for ...
Critical RCEs: Ivanti Standalone Sentry (CVE-2023-41724), Neurons for ITSM (CVE-2023-46808), Telerik Report Server (CVE-2024-1800) [Update] March 22, 2024: “CISA Warns for the Vulnerabilities in Ivant...

Executive Interview: Mr. Miroslav on Mastering the Dynamic Cybersecuri...
Executive Interview: Mr. Miroslav on Mastering the Dynamic Cybersecurity Landscape In the fast-paced and ever-evolving cybersecurity realm, staying ahead with the latest trends and technologies is cru...

Top 5 Russian-Speaking Dark Web Forums
Top 5 Russian-Speaking Dark Web Forums The dark web, a hidden corner of the internet, is a habitat for cybercrime. Among its labyrinthine networks, certain platforms stand out for their influence and ...

Dark Web Profile: ShinyHunters
Dark Web Profile: ShinyHunters Within the obscured world of the Deep/Dark Web, where cybercrime flourishes amidst databases, initial access brokers, and a plethora of illegal activities, there exists ...