Jan 28, 2025
Top 10 Threat Intelligence Conferences to Attend in 2025

Top 10 Threat Intelligence Conferences to Attend in 2025 The rapidly evolving cybersecurity landscape demands constant vigilance, innovation, and collaboration. For professionals in threat intelligenc...

Learn More
Jan 28, 2025
Operation Digital Eye: Exploiting Visual Studio Code Tunnels for Advan...

Operation Digital Eye: Exploiting Visual Studio Code Tunnels for Advanced Intrusions Operation Digital Eye is a cutting-edge cyber campaign executed by Chinese Advanced Persistent Threat (APT) groups....

Learn More
Jan 28, 2025
Dark Web Profile: FunkSec

Dark Web Profile: FunkSec [Update] January 4, 2024: “Update: FunkSec Expands Their Operation and Teams Up With Other Cyber Criminals” A new ransomware group, FunkSec, has gained attention after taking...

Learn More
Jan 27, 2025
The Meeten Campaign: Realst Stealer’s Return Under Guise of Meeting Ap...

The Meeten Campaign: Realst Stealer’s Return Under Guise of Meeting Apps The cybersecurity landscape faces constant evolution, and recent threats highlight the urgency of vigilance. One such sophistic...

Learn More
Jan 27, 2025
CISA KEV 2024 Review: Key Vulnerabilities and Exploitation Trends from...

CISA KEV 2024 Review: Key Vulnerabilities and Exploitation Trends from the Past Year Imagine a bustling city with gates left unlatched, each representing a potential weak point in an organization’s de...

Learn More
Jan 27, 2025
Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber ...

Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber Deception Phishing remains one of the most common cyber threats, with attackers constantly refining their methods to exploit human...

Learn More
Jan 27, 2025
Lyca Mobile Breach, U.S. Government VPN Access, TalkTalk Data Leak Amo...

Lyca Mobile Breach, U.S. Government VPN Access, TalkTalk Data Leak Among Latest Cyber Threats This week, hacker forums revealed several alarming cyber incidents, including an alleged database leak fro...

Learn More
Jan 24, 2025
A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams

A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams For companies all over the globe, Microsoft Teams is becoming an essential tool for teamwork. Nevertheless, because to its extensive use...

Learn More
Jan 24, 2025
Exploited SonicWall Zero-Day and Multiple QNAP Vulnerabilities Demand ...

Exploited SonicWall Zero-Day and Multiple QNAP Vulnerabilities Demand Immediate Action Significant security vulnerabilities have been discovered, affecting SonicWall and QNAP products. These flaws, in...

Learn More
Jan 23, 2025
DDoS Attack Trends: Key Takeaways from Cloudflare’s Q4 2024 DDoS Repor...

DDoS Attack Trends: Key Takeaways from Cloudflare’s Q4 2024 DDoS Report Cybersecurity threats continue to evolve, with Distributed Denial of Service (DDoS) attacks leading the charge in their scale an...

Learn More
Jan 23, 2025
Mastering Ransomware Negotiations: Unlock Critical Skills with SOCRada...

Mastering Ransomware Negotiations: Unlock Critical Skills with SOCRadar’s Expert Training Ransomware attacks have become a pressing concern for organizations of all sizes. Mastering the art of ransomw...

Learn More
Jan 22, 2025
Dark Web Profile: OilRig (APT34)

Dark Web Profile: OilRig (APT34) OilRig, also known as APT34, is a state-sponsored Advanced Persistent Threat (APT) group with strong ties to Iranian intelligence. Known for its sophisticated cyber-es...

Learn More
Jan 22, 2025
Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast...

Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast The cyber world is constantly changing. As technology advances, so do the threats that jeopardize organizations’ security. Decemb...

Learn More
Jan 21, 2025
Major Cyberattacks Targeting Cryptocurrency & NFT Industry

Major Cyberattacks Targeting Cryptocurrency & NFT Industry The volatility of Bitcoin’s value and the wider cryptocurrency market not only draws traders and investors but also entices a varie...

Learn More
Jan 20, 2025
IntelBroker Targets HPE, Carrefour France Leak, Nillious Android RAT

IntelBroker Targets HPE, Carrefour France Leak, Nillious Android RAT SOCRadar’s Dark Web Team has reported significant findings on hacker forums over the past week, including a range of high-profile d...

Learn More
Jan 20, 2025
How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign

How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign Cybersecurity experts are sounding the alarm over a novel spear phishing campaign by the Russian state-sponsored group known as Star Bliz...

Learn More
Jan 18, 2025
The Dark Web Economy: A Hidden Marketplace Reshaping Cybersecurity

The Dark Web Economy: A Hidden Marketplace Reshaping Cybersecurity In today’s digital landscape, cybersecurity isn’t just about sophisticated technical exploits anymore. The game has funda...

Learn More
Jan 17, 2025
The Future of Biometric Authentication in Mobile Banking

The Future of Biometric Authentication in Mobile Banking Biometric authentication is a security mechanism that uses unique biological characteristics to verify a person’s identity. In the context of b...

Learn More
Jan 16, 2025
FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitat...

FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitation [Update] January 18, 2025: “Fortinet’s Official Statement on the Breach” In a shocking development, the fallout from the...

Learn More
Jan 16, 2025
Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructu...

Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure In recent months, Pumakit, a stealthy Linux rootkit, has emerged as a significant threat, targeting critical infrastructure acr...

Learn More