Critical Vulnerabilities in Palo Alto Networks Expedition Could Expose...
Critical Vulnerabilities in Palo Alto Networks Expedition Could Expose Firewall Credentials, Patch Available [Updated] November 15, 2024: “CISA Alerts of Active Exploitation: CVE-2024-9463 and C...
New Ivanti CSA Zero-Days Under Active Exploitation; Critical RCE in Co...
New Ivanti CSA Zero-Days Under Active Exploitation; Critical RCE in Connect Secure & Policy Secure [UPDATE] October 14, 2024: “Nation-State Attack Exploits Ivanti CSA Vulnerabilities, More D...
October 2024 Patch Tuesday Update – Microsoft Fixes 117 Vulnerabilitie...
October 2024 Patch Tuesday Update – Microsoft Fixes 117 Vulnerabilities, 2 Actively Exploited Zero-Days [Update] October 22, 2024: “PoC Exploit Released for Critical WinReg Vulnerability (CVE-20...
Insider Threats: The Hidden Enemy of Cybersecurity
Insider Threats: The Hidden Enemy of Cybersecurity The human factor is one of the most challenging components of cybersecurity, and the topic where the human factor is most evident is insider threats....
Qualcomm Addresses Exploited Zero-Day and a Critical RCE in October 20...
Qualcomm Addresses Exploited Zero-Day and a Critical RCE in October 2024 Security Bulletin Just yesterday, Qualcomm rolled out its latest monthly security bulletin, addressing numerous vulnerabilities...
Overview of the Australian Notifiable Data Breaches Report (H1 2024)
Overview of the Australian Notifiable Data Breaches Report (H1 2024) In September 2024, the Office of the Australian Information Commissioner (OAIC) released its most recent Notifiable Data Breaches (...
FBCS Breach Exposes Millions, Comcast and Truist Bank Affected
FBCS Breach Exposes Millions, Comcast and Truist Bank Affected In February 2024, Financial Business and Consumer Solutions (FBCS), a U.S.-based debt collection agency, experienced a significant data b...
Alleged UAE Credit Cards and BMW Data for Sale, New SMS Bomber Service...
Alleged UAE Credit Cards and BMW Data for Sale, New SMS Bomber Service Detected Recent investigations by the SOCRadar Dark Web Team have revealed a series of significant cyber threats. Among them is t...
CosmicSting (CVE-2024-34102) Vulnerability Under Active Exploitation
CosmicSting (CVE-2024-34102) Vulnerability Under Active Exploitation In a concerning development for e-commerce security, threat actors are actively exploiting a critical vulnerability in Adobe Commer...
Cyber Threats Targeting U.S. Elections in 2024
Cyber Threats Targeting U.S. Elections in 2024 [Last Update] November 5, 2025: “Deepfakes, Disinformation, and Alternative Facts: Voice-based scams” / “Voting Machine Hacking – Colorado’s voting syst...
Foxit Reader Vulnerability (CVE-2024-28888): PoC Code Released, Patch ...
Foxit Reader Vulnerability (CVE-2024-28888): PoC Code Released, Patch to Prevent Attacks Details and a Proof-of-Concept (PoC) exploit code for a serious vulnerability in Foxit Reader have recently eme...
Education Industry Threat Landscape Report: Trends, Threats, and Defen...
Education Industry Threat Landscape Report: Trends, Threats, and Defensive Strategies As the education industry increasingly embraces digital tools and platforms, cyber threats have evolved to target ...
Biometric Security Risks: Beyond Fingerprints and Facial Recognition
Biometric Security Risks: Beyond Fingerprints and Facial Recognition Biometrics, the science of identifying individuals based on their unique physical and behavioral characteristics, has a rich histor...
RCE Vulnerability in Zimbra (CVE-2024-45519) Actively Exploited, Admin...
RCE Vulnerability in Zimbra (CVE-2024-45519) Actively Exploited, Administrators Advised to Patch Immediately Recently, Zimbra, a widely used email and collaboration platform, addressed a critical vuln...
The Role of Honeypots in Cybersecurity
The Role of Honeypots in Cybersecurity In the constantly evolving landscape of cybersecurity, organizations employ a variety of tools and strategies to detect and defend against cyber threats. One par...
From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1
From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1 The first half of the year has been marked by sophisticated attacks, with ransomware incidents reaching alarming new heights and crit...
What You Need to Know About the CTI Capability Maturity Model (CTI-CMM...
What You Need to Know About the CTI Capability Maturity Model (CTI-CMM) As cyber threats grow in complexity and frequency, organizations are left grappling with how to respond effectively. Many strugg...
Dark Web Profile: UserSec
Dark Web Profile: UserSec UserSec, a pro-Russian hacktivist group, first gained attention in early 2023. The group actively targets Western governments, organizations, and critical infrastructure, par...
Major Leaks: Twitch, Thai Honda, and Erasmus+ Data Allegedly Exposed
Major Leaks: Twitch, Thai Honda, and Erasmus+ Data Allegedly Exposed The SOCRadar Dark Web Team continues to monitor the hacker underground; recent findings include the alleged sale of Thai Honda̵...
CUPS Vulnerabilities: What You Need to Know
CUPS Vulnerabilities: What You Need to Know [Update] October 9, 2024: “Automated Scanner Released for CVE-2024-47176 in CUPS” [Update] October 4, 2024: “New Attack Vector in CUPS Exposes ...