Jan 26, 2024
Securing the Chain: How Threat Intelligence Strengthens Third-Party Ri...

Securing the Chain: How Threat Intelligence Strengthens Third-Party Risk Management Businesses increasingly face new cybersecurity incidents that are disruptive, costly, and can significantly damage t...

Learn More
Jan 26, 2024
Russian APT Operation: Star Blizzard

Russian APT Operation: Star Blizzard [Update] January 30, 2024: “Official Attributions of Star Blizzard” Within the continuously changing cyber threat landscape, the strategies of Star Blizzard unfold...

Learn More
Jan 26, 2024
Critical RCE Vulnerability in Cisco Unified Communications with Risk o...

Critical RCE Vulnerability in Cisco Unified Communications with Risk of Root Access (CVE-2024-20253) The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting Cisco ...

Learn More
Jan 26, 2024
A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Ons...

A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Onslaught As we reflect on the cybersecurity journey of 2023, we uncover valuable lessons that shape our understanding of the ever-ch...

Learn More
Jan 26, 2024
Dark Peep #9: The McFlurry Bandit

Dark Peep #9: The McFlurry Bandit Welcome to “Dark Peep #9.” This edition takes you behind the scenes of the digital world, where every byte tells a story. Here, we uncover the ongoing sagas of cyberc...

Learn More
Jan 25, 2024
Stealer Malware 101: Understanding the Different Variants and Families

Stealer Malware 101: Understanding the Different Variants and Families In the realm of cybersecurity, malicious software (malware) continues to evolve, with various types targeting sensitive data for ...

Learn More
Jan 25, 2024
Writing YARA Rules with Custom GPTs and SOCRadar Platform

Writing YARA Rules with Custom GPTs and SOCRadar Platform YARA rules stand out as essential instruments for identifying and classifying malware. These rules are indispensable for cybersecurity profess...

Learn More
Jan 24, 2024
Critical Jenkins CLI File Read Vulnerability Could Lead to RCE Attacks...

Critical Jenkins CLI File Read Vulnerability Could Lead to RCE Attacks (CVE-2024-23897) [Update] August 20, 2024: “Critical Jenkins Vulnerability Added to CISA’s Known Exploited Vulnerabilities Catalo...

Learn More
Jan 24, 2024
Dark Web Profile: Malek Team

Dark Web Profile: Malek Team In recent months, the Malek Team, a hacker group with alleged links to Iran, has escalated its cyber offensive against key Israeli institutions, marking a significant upti...

Learn More
Jan 24, 2024
Critical Auth Bypass in GoAnywhere MFT: Is It a New Ransomware Gateway...

Critical Auth Bypass in GoAnywhere MFT: Is It a New Ransomware Gateway? (CVE-2024-0204) Fortra has disclosed a critical vulnerability in its GoAnywhere MFT (Managed File Transfer) software – an authen...

Learn More
Jan 24, 2024
Dark Web Profile: INC Ransom

Dark Web Profile: INC Ransom The digital world is constantly under the threat of cyber attacks, and the emergence of new ransomware groups only intensifies this peril. One such group that has recently...

Learn More
Jan 23, 2024
Sensitive Information in APIs and Secure Usage of Postman

Sensitive Information in APIs and Secure Usage of Postman One of the developers’ most frequently used tools in software development is undoubtedly Postman. But what exactly are API and Postman, and ho...

Learn More
Jan 23, 2024
What is SIM Swapping?

What is SIM Swapping? [Update] February 11, 2025: “Guilty Plea in SEC X Account Hijacking and Bitcoin ETF Hoax”  SIM swapping attacks have emerged as a formidable and increasingly prevalen...

Learn More
Jan 23, 2024
New Apple Zero-Day in WebKit Received a Fix (CVE-2024-23222)

New Apple Zero-Day in WebKit Received a Fix (CVE-2024-23222) [Update] January 24, 2024: “Apple WebKit Zero-Day CVE-2024-23222 Enters CISA KEV Catalog” Apple has issued security updates to address the ...

Learn More
Jan 22, 2024
A Year of Vigilance and Innovation, Triumphs of CISA in 2023

A Year of Vigilance and Innovation, Triumphs of CISA in 2023 In its fifth year on the cybersecurity frontier since its establishment in 2018, the Cybersecurity and Infrastructure Security Agency (CISA...

Learn More
Jan 22, 2024
Dark Web Profile: WereWolves Ransomware

Dark Web Profile: WereWolves Ransomware Emerging as a new group in the cybercrime landscape, this Russian-speaking group, WereWolves Ransomware, has gained notoriety recently for its rapid emergence l...

Learn More
Jan 22, 2024
Sales of Trello Database, Ivanti Zero-Day Exploits, Phantom Loader, US...

Sales of Trello Database, Ivanti Zero-Day Exploits, Phantom Loader, US and Australia Credit Cards In SOCRadar Dark Web Team’s latest findings, from their week-long monitoring of the dark web, an unaut...

Learn More
Jan 19, 2024
Okta Customer Support System Breach: Lessons in Supply Chain Risks and...

Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...

Learn More
Jan 19, 2024
Oracle Issued 389 New Security Patches in January 2024 Critical Patch ...

Oracle Issued 389 New Security Patches in January 2024 Critical Patch Update Oracle has released its Critical Patch Update advisory for January 2024, aimed at remedying vulnerabilities spanning variou...

Learn More
Jan 19, 2024
Cyber Insurance in the Age of Ransomware: Protection or Provocation?

Cyber Insurance in the Age of Ransomware: Protection or Provocation? Businesses are increasingly facing the threat of cybercrime, particularly ransomware. This malicious software locks users out of th...

Learn More