
Securing the Chain: How Threat Intelligence Strengthens Third-Party Ri...
Securing the Chain: How Threat Intelligence Strengthens Third-Party Risk Management Businesses increasingly face new cybersecurity incidents that are disruptive, costly, and can significantly damage t...

Russian APT Operation: Star Blizzard
Russian APT Operation: Star Blizzard [Update] January 30, 2024: “Official Attributions of Star Blizzard” Within the continuously changing cyber threat landscape, the strategies of Star Blizzard unfold...

Critical RCE Vulnerability in Cisco Unified Communications with Risk o...
Critical RCE Vulnerability in Cisco Unified Communications with Risk of Root Access (CVE-2024-20253) The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting Cisco ...

A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Ons...
A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Onslaught As we reflect on the cybersecurity journey of 2023, we uncover valuable lessons that shape our understanding of the ever-ch...

Dark Peep #9: The McFlurry Bandit
Dark Peep #9: The McFlurry Bandit Welcome to “Dark Peep #9.” This edition takes you behind the scenes of the digital world, where every byte tells a story. Here, we uncover the ongoing sagas of cyberc...

Stealer Malware 101: Understanding the Different Variants and Families
Stealer Malware 101: Understanding the Different Variants and Families In the realm of cybersecurity, malicious software (malware) continues to evolve, with various types targeting sensitive data for ...

Writing YARA Rules with Custom GPTs and SOCRadar Platform
Writing YARA Rules with Custom GPTs and SOCRadar Platform YARA rules stand out as essential instruments for identifying and classifying malware. These rules are indispensable for cybersecurity profess...

Critical Jenkins CLI File Read Vulnerability Could Lead to RCE Attacks...
Critical Jenkins CLI File Read Vulnerability Could Lead to RCE Attacks (CVE-2024-23897) [Update] August 20, 2024: “Critical Jenkins Vulnerability Added to CISA’s Known Exploited Vulnerabilities Catalo...

Dark Web Profile: Malek Team
Dark Web Profile: Malek Team In recent months, the Malek Team, a hacker group with alleged links to Iran, has escalated its cyber offensive against key Israeli institutions, marking a significant upti...

Critical Auth Bypass in GoAnywhere MFT: Is It a New Ransomware Gateway...
Critical Auth Bypass in GoAnywhere MFT: Is It a New Ransomware Gateway? (CVE-2024-0204) Fortra has disclosed a critical vulnerability in its GoAnywhere MFT (Managed File Transfer) software – an authen...

Dark Web Profile: INC Ransom
Dark Web Profile: INC Ransom The digital world is constantly under the threat of cyber attacks, and the emergence of new ransomware groups only intensifies this peril. One such group that has recently...

Sensitive Information in APIs and Secure Usage of Postman
Sensitive Information in APIs and Secure Usage of Postman One of the developers’ most frequently used tools in software development is undoubtedly Postman. But what exactly are API and Postman, and ho...

What is SIM Swapping?
What is SIM Swapping? [Update] February 11, 2025: “Guilty Plea in SEC X Account Hijacking and Bitcoin ETF Hoax” SIM swapping attacks have emerged as a formidable and increasingly prevalen...

New Apple Zero-Day in WebKit Received a Fix (CVE-2024-23222)
New Apple Zero-Day in WebKit Received a Fix (CVE-2024-23222) [Update] January 24, 2024: “Apple WebKit Zero-Day CVE-2024-23222 Enters CISA KEV Catalog” Apple has issued security updates to address the ...

A Year of Vigilance and Innovation, Triumphs of CISA in 2023
A Year of Vigilance and Innovation, Triumphs of CISA in 2023 In its fifth year on the cybersecurity frontier since its establishment in 2018, the Cybersecurity and Infrastructure Security Agency (CISA...

Dark Web Profile: WereWolves Ransomware
Dark Web Profile: WereWolves Ransomware Emerging as a new group in the cybercrime landscape, this Russian-speaking group, WereWolves Ransomware, has gained notoriety recently for its rapid emergence l...

Sales of Trello Database, Ivanti Zero-Day Exploits, Phantom Loader, US...
Sales of Trello Database, Ivanti Zero-Day Exploits, Phantom Loader, US and Australia Credit Cards In SOCRadar Dark Web Team’s latest findings, from their week-long monitoring of the dark web, an unaut...

Okta Customer Support System Breach: Lessons in Supply Chain Risks and...
Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...

Oracle Issued 389 New Security Patches in January 2024 Critical Patch ...
Oracle Issued 389 New Security Patches in January 2024 Critical Patch Update Oracle has released its Critical Patch Update advisory for January 2024, aimed at remedying vulnerabilities spanning variou...

Cyber Insurance in the Age of Ransomware: Protection or Provocation?
Cyber Insurance in the Age of Ransomware: Protection or Provocation? Businesses are increasingly facing the threat of cybercrime, particularly ransomware. This malicious software locks users out of th...