
CISA Warned of Critical Fortinet Vulnerability (CVE-2023-44250) and Is...
CISA Warned of Critical Fortinet Vulnerability (CVE-2023-44250) and Issued a New ICS Advisory In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) has urged users and adminis...

January 2024 – Microsoft Patch Tuesday & SAP Security Patch Day Highli...
January 2024 – Microsoft Patch Tuesday & SAP Security Patch Day Highlights Microsoft has released its January 2024 Patch Tuesday, addressing a total of 48 security vulnerabilities, with two classi...

The Persistent Threat of Ransomware: A 2023 Overview
The Persistent Threat of Ransomware: A 2023 Overview As we enter another year, the persistent threat of ransomware remains a critical concern for businesses and governments worldwide. SOCRadar’s compr...

Custom GPTs: A Case of Malware Analysis and IoC Analyzing
Custom GPTs: A Case of Malware Analysis and IoC Analyzing On November 6, 2023, CustomGPTs, a new feature that OpenAI stated on its blog, became available. We can already say that the emergence of Cust...

Cyber Siege: The Growing Threat to the US Healthcare
Cyber Siege: The Growing Threat to the US Healthcare Last week, the US healthcare sector faced a surge in cyber attacks, marking a troubling start to the year. This wave of incidents, from data breach...

Mastercard Data Leak, New Fully Undetectable Ransomware, Elusive Steal...
Mastercard Data Leak, New Fully Undetectable Ransomware, Elusive Stealer Source Code Leak, and More In recent discoveries across the cyber threat landscape, the SOCRadar Dark Web Team has identifi...

Your Data is Secure and Private with SOC 2 Type 2 Compliant SOCRadar
Your Data is Secure and Private with SOC 2 Type 2 Compliant SOCRadar We are pleased to share an important update regarding the security and privacy of your data with SOCRadar. Upholding the highest da...

Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Criti...
Ivanti Released a Patch in Endpoint Manager Solution (EPM) for a Critical Vulnerability, CVE-2023-39336 Ivanti has addressed a critical vulnerability in its Endpoint Manager (EPM) solution, identified...

CISA Issues ICS Advisories for Vulnerabilities Affecting Rockwell Auto...
CISA Issues ICS Advisories for Vulnerabilities Affecting Rockwell Automation, Mitsubishi Electric, and Unitronics CISA has issued three advisories on Industrial Control Systems (ICS), addressing the l...

2023 Dark Web Trends in SOCRadar Year-End Report
2023 Dark Web Trends in SOCRadar Year-End Report The cybersecurity landscape in 2023 underwent significant transformations, as evidenced by the SOCRadar 2023 End-of-Year Report. This comprehensive rep...

Sharpen Penetration Testing with Cyber Threat Intelligence
Sharpen Penetration Testing with Cyber Threat Intelligence We hope our readers are proficient with figures. Let’s dive into some statistics. In 2022, security incidents amounted to a stagg...

CISA Issues Alert for Juniper Secure Analytics Vulnerabilities (CVE-20...
CISA Issues Alert for Juniper Secure Analytics Vulnerabilities (CVE-2023-46604, CVE-2023-40787, CVE-2023-44487, and More) In a recent alert, the Cybersecurity and Infrastructure Security Agency (C...

National Credit Union Administration and GTA 5 Leaks, Craxs RAT, New W...
National Credit Union Administration and GTA 5 Leaks, Craxs RAT, New Windows Stealer The SOCRadar Dark Web Team has detected critical events, including the alleged Grand Theft Auto V source code leak ...

Dark Web Profile: Cactus Ransomware
Dark Web Profile: Cactus Ransomware A new plant has grown in the desert of cyber threats, wielding its thorns to pierce through organizations and individuals alike. The Cactus Ransomware Group, a name...

Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privileg...
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain A recent Unit 42 investigation revealed a dual privilege escalation chain impacting Google Kubernetes E...

Operation Triangulation: ‘’Most Sophisticated Attack Chain Ever Seen"...
Operation Triangulation: ‘’Most Sophisticated Attack Chain Ever Seen” The cyber security landscape has recently been abuzz with discussions about Operation Triangulation, a sophisticated and mul...
