Nov 03, 2022
Fortinet Fixes Six Serious Vulnerabilities

Fortinet Fixes Six Serious Vulnerabilities Including six vulnerabilities with a high severity rating, Fortinet warned customers on Tuesday (1 November) of 16 vulnerabilities found in the company’...

Learn More
Nov 02, 2022
Dark Web Stories: DDoS as a Service

Dark Web Stories: DDoS as a Service DoS (Denial-of-service attacks) are frequently encountered in the cyber world and result in violation of the availability of online services. When this attack is ma...

Learn More
Nov 01, 2022
OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed

OpenSSL Announced Two High-Severity Vulnerabilities Are Fixed On November 1, Version 3.0.7 of OpenSSL was released to fix two high-severity vulnerabilities (CVE-2022-3602 and ...

Learn More
Nov 01, 2022
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial ...

LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial Industry In the first eight months of 2022, the SOCRadar CTIA Team examined 1,700 ransomware threats published on dark web forums ...

Learn More
Nov 01, 2022
A New Rising Social Engineering Trend: Callback Phishing

A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...

Learn More
Oct 31, 2022
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales...

The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...

Learn More
Oct 31, 2022
MFA Bypass Techniques: How Does it Work?

MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...

Learn More
Oct 31, 2022
Halloween Special: The Spookiest Cybersecurity Stories

Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notificat...

Learn More
Oct 28, 2022
What Do You Need to Know About New Critical Vulnerability in OpenSSL

What Do You Need to Know About New Critical Vulnerability in OpenSSL Version 3.0.7 of OpenSSL is expected to be released on November 1 to fix a critical vulnerability that has not yet been made public...

Learn More
Oct 28, 2022
Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer

Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer On Tuesday, October 25th, 2022, a federal grand jury indictment charges a Ukrainian national, Mark Sokolovsky, 26, also known as P...

Learn More
Oct 27, 2022
Ransomware Strikes Thailand Manufacturing Industry

Ransomware Strikes Thailand Manufacturing Industry Data leaks are a significant concern for every organization. Between September 2021 and September 2022, theft or leak of data has been a big issue fo...

Learn More
Oct 26, 2022
Cloud Security Module: Minimize Risk of Misconfigured Buckets

Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...

Learn More
Oct 26, 2022
22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution

22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution CVE-2022-35737 is a vulnerability caused by the “Improper Validation of Array Index.” The vulnerability has a ...

Learn More
Oct 25, 2022
Financial Industry Shaken by DDoS Attacks

Financial Industry Shaken by DDoS Attacks Distributed denial-of-service (DDoS) attacks are one of the most common techniques along with cyber criminals. Despite being temporary, DDoS attacks can have ...

Learn More
Oct 25, 2022
Apple Releases Patch for Exploited Zero-Day

Apple Releases Patch for Exploited Zero-Day Threat actors actively exploiting the remote code execution vulnerability tagged CVE-2022-42827. On compromised iOS devices, an application may be able...

Learn More
Oct 24, 2022
The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks...

The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...

Learn More
Oct 21, 2022
Ursnif Malware Moving to Ransomware Operations from Bank Account Theft

Ursnif Malware Moving to Ransomware Operations from Bank Account Theft Ursnif (a.k.a. Gozi), a former banking trojan, has been repurposed as a generic backdoor. Threat actors could use the new va...

Learn More
Oct 21, 2022
Finance Threat Landscape Report: 17.5M Credit Card Numbers Sold on Bla...

Finance Threat Landscape Report: 17.5M Credit Card Numbers Sold on Blackmarket The dark web’s levels of anonymity make it the ideal hub for all kinds of cybercrime activity. Finance is one of th...

Learn More
Oct 20, 2022
Details On The Largest B2B Leak: BlueBleed

Details On The Largest B2B Leak: BlueBleed As a cyber threat intelligence company, SOCRadar’s mission is to use every possible piece of information to identify and prevent cyber threats targetin...

Learn More
Oct 20, 2022
Collective Cyber Attacks by Hacktivists: What's Going on in Iran?

Collective Cyber Attacks by Hacktivists: What’s Going on in Iran? Iran is under the influence of a massive hacktivism attack that has recently begun and is still ongoing. The protests, which beg...

Learn More