Free Trial
Dark Web Report
Sep 18, 2023
LockBit’s New Regulations Sets Minimum For Ransom Demands

LockBit’s New Regulations Sets Minimum For Ransom Demands Recently, the notorious LockBit ransomware group has initiated a significant discussion among its affiliates regarding potential cha...

Learn More
Sep 16, 2023
Why are Threat Actors Targeting Indonesia?

Why are Threat Actors Targeting Indonesia? On September 3, Indonesia hiked fuel prices by 30%, stating that petrol and diesel prices are still low by world standards, but subsidies are unsustainable. ...

Learn More
Sep 15, 2023
MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’

MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’ [Update] January 31, 2025: “Preliminary Approval of $45 Million Settlement in MGM Data Breach Class Action” A cybercriminal gang employing ...

Learn More
Sep 14, 2023
Overview of TIBER-EU From Threat Intelligence Perspective

Overview of TIBER-EU From Threat Intelligence Perspective Financial institutions are crucial for the global economy. They hold trillions of dollars in assets and billions of customer records. As such,...

Learn More
Sep 14, 2023
LockBit Attack Fails, 3AM Ransomware Steps In as Plan B

LockBit Attack Fails, 3AM Ransomware Steps In as Plan B Researchers have recently identified a new strain of ransomware called 3AM. Their investigation revealed that the first known usage of this rans...

Learn More
Sep 13, 2023
Top 10 Facts About MOVEit Breach

Top 10 Facts About MOVEit Breach In the ever-evolving cybersecurity landscape, breaches have become all too common, sending shockwaves through industries and leaving organizations scrambling to recove...

Learn More
Sep 13, 2023
September 2023 Patch Tuesday by Microsoft Fixes Five Critical, Two Zer...

September 2023 Patch Tuesday by Microsoft Fixes Five Critical, Two Zero-Day Vulnerabilities [Update] September 15, 2023: See the subheading: “Proof-of-Concept (PoC) Exploit Available for CVE-2023-3814...

Learn More
Sep 12, 2023
Mother of the Threats: Threat as a Service

Mother of the Threats: Threat as a Service Anonymous Russia’s botnet service Tesla-bot announced a new malicious service model on its Telegram channel. This new type of service and concept, whic...

Learn More
Sep 12, 2023
Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-...

Cisco Zero-Day Vulnerability Exploited by LockBit and Akira (CVE-2023-20269) Cisco recently issued an advisory regarding a zero-day vulnerability, CVE-2023-20269, in its Adaptive Security Appliance (A...

Learn More
Sep 12, 2023
Cobalt Strike Leak, Sales of Unauthorized Access and Credit Card Data

Cobalt Strike Leak, Sales of Unauthorized Access and Credit Card Data The SOCRadar Dark Web Team conducts continuous monitoring of the dark web, uncovering the latest threats that require your attenti...

Learn More
Sep 11, 2023
Telegram Hit by a DDoS Attack: What Is the Cause Behind It?

Telegram Hit by a DDoS Attack: What Is the Cause Behind It? In a recent update, a well-known and notorious threat actor declared their targeting of Telegram. This group initiated the attack after Tele...

Learn More
Sep 11, 2023
Major Cyberattacks in Review: August 2023

Major Cyberattacks in Review: August 2023 August 2023 has not passed without its share of significant cyberattacks. Among the incidents of last month, we have observed multiple data breaches involving...

Learn More
Sep 07, 2023
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...

Learn More
Sep 07, 2023
Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole ...

Microsoft Reveals How Storm-0558 Acquired the Signing Key: They Stole From a Crash Dump Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor ...

Learn More
Sep 06, 2023
Main Analytical Frameworks for Cyber Threat Intelligence

Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Learn More
Sep 06, 2023
ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found...

ASUS Routers Under Risk of RCE Attacks: Critical Vulnerabilities Found (CVE-2023-39238, CVE-2023-39239, CVE-2023-39240) Security researchers have recently unearthed three security vulnerabilities affe...

Learn More
Sep 05, 2023
Dark Web Profile: Medusa Ransomware (MedusaLocker)

Dark Web Profile: Medusa Ransomware (MedusaLocker) [Update] March 13, 2025: CISA, FBI, and MS-ISAC Warn of Medusa Ransomware Threats in New Advisory In ancient Greek mythology, Medusa stands as one of...

Learn More
Sep 05, 2023
Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter,...

Sales of International IDs, UK Bank Leads, Fully Undetectable Crypter, US Instagram Database Leak Introducing our weekly Dark Web digest, where we explore the most recent occurrences in the online und...

Learn More
Sep 05, 2023
Threat Actors Accessed UK Military Data From Weakest Link

Threat Actors Accessed UK Military Data From Weakest Link On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed...

Learn More
Sep 05, 2023
MalDoc in PDF: A Novel Method to Distribute Malicious Macros

MalDoc in PDF: A Novel Method to Distribute Malicious Macros Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various ...

Learn More