Sep 14, 2023
LockBit Attack Fails, 3AM Ransomware Steps In as Plan B

LockBit Attack Fails, 3AM Ransomware Steps In as Plan B Researchers have recently identified a new strain of ransomware called 3AM. Their investigation revealed that the first known usage of this rans...

Learn More
Sep 13, 2023
Top 10 Facts About MOVEit Breach

Top 10 Facts About MOVEit Breach In the ever-evolving cybersecurity landscape, breaches have become all too common, sending shockwaves through industries and leaving organizations scrambling to recove...

Learn More
Sep 13, 2023
September 2023 Patch Tuesday by Microsoft Fixes Five Critical, Two Zer...

September 2023 Patch Tuesday by Microsoft Fixes Five Critical, Two Zero-Day Vulnerabilities [Update] September 15, 2023: See the subheading: “Proof-of-Concept (PoC) Exploit Available for CVE-2023-3814...

Learn More
Sep 12, 2023
Mother of the Threats: Threat as a Service

Mother of the Threats: Threat as a Service Anonymous Russia’s botnet service Tesla-bot announced a new malicious service model on its Telegram channel. This new type of service and concept, whic...

Learn More
Sep 12, 2023
Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-...

Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-20269) Cisco recently issued an advisory regarding a zero-day vulnerability, CVE-2023-20269, in its Adaptive Security Appliance (A...

Learn More
Sep 12, 2023
Cobalt Strike Leak, Sales of Unauthorized Access and Credit Card Data

Cobalt Strike Leak, Sales of Unauthorized Access and Credit Card Data The SOCRadar Dark Web Team conducts continuous monitoring of the dark web, uncovering the latest threats that require your attenti...

Learn More
Sep 11, 2023
Telegram Hit by a DDoS Attack: What Is the Cause Behind It?

Telegram Hit by a DDoS Attack: What Is the Cause Behind It? In a recent update, a well-known and notorious threat actor declared their targeting of Telegram. This group initiated the attack after Tele...

Learn More
Sep 11, 2023
Major Cyberattacks in Review: August 2023

Major Cyberattacks in Review: August 2023 August 2023 has not passed without its share of significant cyberattacks. Among the incidents of last month, we have observed multiple data breaches involving...

Learn More
Sep 07, 2023
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...

Learn More
Sep 07, 2023
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole ...

Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor ...

Learn More
Sep 06, 2023
Main Analytical Frameworks for Cyber Threat Intelligence

Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Learn More
Sep 06, 2023
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found...

ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240) Security researchers have recently unearthed three security vulnerabilities affe...

Learn More
Sep 05, 2023
Dark Web Profile: Medusa Ransomware (MedusaLocker)

Dark Web Profile: Medusa Ransomware (MedusaLocker) [Update] March 13, 2025: CISA, FBI, and MS-ISAC Warn of Medusa Ransomware Threats in New Advisory In ancient Greek mythology, Medusa stands as one of...

Learn More
Sep 05, 2023
Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter,...

Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter, US Instagram Database Leak Introducing our weekly Dark Web digest, where we explore the most recent occurrences in the online und...

Learn More
Sep 05, 2023
Threat Actors Accessed UK Military Data From Weakest Link

Threat Actors Accessed UK Military Data From Weakest Link On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed...

Learn More
Sep 05, 2023
MalDoc in PDF: A Novel Method to Distribute Malicious Macros

MalDoc in PDF: A Novel Method to Distribute Malicious Macros Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various ...

Learn More
Sep 04, 2023
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023 For the latest version, check our Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025. Keeping abreast of cybersec...

Learn More
Sep 04, 2023
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...

Learn More
Sep 01, 2023
Don't be Blinded by What You See: Demystifying Homograph Attacks

Don’t be Blinded by What You See: Demystifying Homograph Attacks ...

Learn More
Aug 31, 2023
QakBot, One of The Most Observed Malware

QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...

Learn More