The Exodus Began: Alternatives for Telegram
The Exodus Began: Alternatives for Telegram As Telegram implements new policies to curb illegal activities by using AI to detect and hide unlawful content, threat actors are increasingly moving away f...
Critical Vulnerabilities in Pure Storage & Aruba Access Points Pose Un...
Critical Vulnerabilities in Pure Storage & Aruba Access Points Pose Unauthorized Access, RCE Risks Security updates were released addressing critical vulnerabilities in both Pure Storage and Aruba...
Severe Vulnerabilities in Cisco IOS, IOS XE and Other Products Address...
Severe Vulnerabilities in Cisco IOS, IOS XE and Other Products Addressed – Patch Now Cisco, a leading provider of network technologies, has issued new security advisories addressing 16 vulnerabilities...
Top 10 CISO Statistics and Trends in Cybersecurity for 2024
Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-da...
Critical Ivanti vTM Vulnerability Exploited (CVE-2024-7593); pgAdmin F...
Critical Ivanti vTM Vulnerability Exploited (CVE-2024-7593); pgAdmin Flaw Could Expose Data (CVE-2024-9014) Critical vulnerabilities in Ivanti vTM and PostgreSQL’s pgAdmin tool have recently come unde...
How Machine Learning is Revolutionizing Cybersecurity
How Machine Learning is Revolutionizing Cybersecurity In today’s digital age, cyber threats multiply at an alarming rate, putting enormous pressure on organizations to strengthen their defenses....
Chrome Security Evolution and Impact on Stealer Logs in the Undergroun...
Chrome Security Evolution and Impact on Stealer Logs in the Underground Market [Update] October 30, 2024: “New Tool Compromises Chrome’s Enhanced Cookie Encryption” As one of the most widely use...
Deloitte Breach, Star Health Data, 100 Million Stealer Logs for Sale
Deloitte Breach, Star Health Data, 100 Million Stealer Logs for Sale Recent findings by the SOCRadar Dark Web Team reveal a series of alarming cyber incidents. Among them is the alleged data leak of D...
Critical Vulnerability in Ivanti Cloud Services Appliance (CSA) Exploi...
Critical Vulnerability in Ivanti Cloud Services Appliance (CSA) Exploited in Attacks: CVE-2024-8963 Ivanti has disclosed a critical vulnerability identified as CVE-2024-8963, affecting its Cloud Servi...
Dark Web Profile: Just Evil
Dark Web Profile: Just Evil [Update] October 23, 2024: “Founder of Just Evil and KillNet Allegedly Killed in Drone Attack” Just Evil is a pro-Russian cyber threat group formed in January 2024 by KillM...
How the FBI Dismantled Raptor Train, a Major China State-Sponsored Bot...
How the FBI Dismantled Raptor Train, a Major China State-Sponsored Botnet In a major breakthrough, the FBI has recently dismantled “Raptor Train,” an extensive botnet controlled by state-s...
Safeguarding Your Business: The Importance of Fraud Protection
Safeguarding Your Business: The Importance of Fraud Protection In the past, banks employed various methods to protect their customers’ money. They installed heavy-duty vaults made of steel and iron to...
UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War...
UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War an Overview As the Russia-Ukraine war unfolds, its impact extends far beyond the battlefield, rippling through cyberspace and aff...
Critical Patches Released for VMware vCenter Server and GitLab (CVE-20...
Critical Patches Released for VMware vCenter Server and GitLab (CVE-2024-38812, CVE-2024-45409) [Update] October 7, 2024: “PoC Exploit and Details Released for CVE-2024-45409 Affecting GitLab...
Top 10 Free Penetration Testing Tools
Top 10 Free Penetration Testing Tools Penetration testing, or pentesting, is a security practice where real-world attacks are simulated on an organization’s systems to identify vulnerabilities and sec...
SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead o...
SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead of Cyber Threats Cyber threats come in many forms, driven by diverse motivations from ransomware that seeks financial gain to polit...
Cyber Insurance and Protecting Against Security Breaches
Cyber Insurance and Protecting Against Security Breaches With the rise of digital threats, cyber insurance has become an important part of risk management for businesses of all sizes. As cyberattacks ...
Major Cyber Attacks in Review: August 2024
Major Cyber Attacks in Review: August 2024 August 2024 witnessed a series of impactful cyber attacks targeting industries from airport services in Canada to key financial institutions in the U.S. This...
Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Dat...
Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Data Exposed The SOCRadar Dark Web Team continues its diligent monitoring of the hacker landscape; several significant cyber threats ...
The Buyer's Guide to Extended Threat Intelligence - SOCRadar
The Buyer’s Guide to Extended Threat Intelligence – SOCRadar Imagine walking into the office on a regular Tuesday morning. As the CISO, you grab your coffee, sit at your desk, and are immediately floo...