Jan 16, 2025
Top 10 AI-Powered Cybersecurity Platforms

Top 10 AI-Powered Cybersecurity Platforms Artificial Intelligence (AI) has become a cornerstone in modern cybersecurity, transforming how organizations anticipate and respond to threats. At the same t...

Learn More
Jan 15, 2025
From Hacktivists to Cyberterrorists: Understanding Modern Motivations

From Hacktivists to Cyberterrorists: Understanding Modern Motivations As digital infrastructure grows, the landscape of cyber threats has evolved in complexity and scope. What started as isolated inci...

Learn More
Jan 15, 2025
January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SA...

January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SAP & Fortinet Updates [Update] January 16, 2025: “Growing Risk from CVE-2024-55591 as FortiGate Exploits Resurface” Microsoft h...

Learn More
Jan 14, 2025
The Evolution of Ransomware: From Simple Encryption to Double Extortio...

The Evolution of Ransomware: From Simple Encryption to Double Extortion Tactics The evolution of ransomware represents one of the most significant transformations in the cybersecurity landscape over t...

Learn More
Jan 14, 2025
An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerab...

An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerability (CVE-2025-0282) [Update] January 17, 2025: “PoC Exploit Released for Ivanti Connect Secure CVE-2025-0282 Vulnerability...

Learn More
Jan 13, 2025
Dux Human Health Breach, U.S. Credit Card Sale, Boulanger Database Lea...

Dux Human Health Breach, U.S. Credit Card Sale, Boulanger Database Leak, and More SOCRadar’s Dark Web Team has monitored concerning activity on hacker forums over the past week, revealing significant ...

Learn More
Jan 10, 2025
Major Cyber Attacks in Review: December 2024

Major Cyber Attacks in Review: December 2024 December 2024 saw a series of significant cyber attacks that targeted multiple industries, from healthcare to telecommunications. Ransomware groups like Bl...

Learn More
Jan 09, 2025
Ivanti Zero-Day Exploited in Connect Secure, SonicWall SSL VPN and SSH...

Ivanti Zero-Day Exploited in Connect Secure, SonicWall SSL VPN and SSH Vulnerabilities, KerioControl Flaw [Update] February 17, 2025: “SPAWNCHIMERA Malware Actively Exploiting CVE-2025-0282̶...

Learn More
Jan 09, 2025
The Role of Cybersecurity in Protecting Critical Infrastructure: Focus...

The Role of Cybersecurity in Protecting Critical Infrastructure: Focus on Energy and Water Sectors Critical infrastructure serves as the foundation of modern society, encompassing the systems and asse...

Learn More
Jan 08, 2025
End of the Year Report 2024: Uncovering Global Cyber Threats and Trend...

End of the Year Report 2024: Uncovering Global Cyber Threats and Trends As we close the chapter on 2024, the global cybersecurity landscape reveals a year of unprecedented challenges and transformativ...

Learn More
Jan 08, 2025
Gravy Analytics Breach Puts Millions of Location Records at Risk and H...

Gravy Analytics Breach Puts Millions of Location Records at Risk and Highlights Privacy Threats In an alarming security event, Gravy Analytics, a location data broker, has allegedly fallen victim to a...

Learn More
Jan 07, 2025
Turla Cyber Campaign Targeting Pakistan's Critical Infrastructure

Turla Cyber Campaign Targeting Pakistan’s Critical Infrastructure Among the most notorious cyber threat actors, the Turla group has garnered attention for its sophisticated and complex cyber att...

Learn More
Jan 07, 2025
The Importance of Cyber Hygiene: Best Practices for Employees to Preve...

The Importance of Cyber Hygiene: Best Practices for Employees to Prevent Data Breaches Cyber hygiene has never been more crucial in the current digital era. Because cyber dangers are getting more comp...

Learn More
Jan 07, 2025
Comprehensive Guide to IoC Enrichment and SOCRadar's New IoC Enrichmen...

Comprehensive Guide to IoC Enrichment and SOCRadar’s New IoC Enrichment Module The ability to quickly and accurately identify potential threats is crucial. Indicator of Compromise (IoC) enrichment is ...

Learn More
Jan 06, 2025
Black Basta’s Tactical Evolution: Deploying Zbot, DarkGate, and Bespok...

Black Basta’s Tactical Evolution: Deploying Zbot, DarkGate, and Bespoke Malware In the ever-escalating landscape of cyber threats, Black Basta has emerged as a formidable ransomware group, continually...

Learn More
Jan 06, 2025
Dark Web Profile: Kairos Extortion Group

Dark Web Profile: Kairos Extortion Group Kairos is a low-profile but rising cyber extortion group that has been active since late 2024. Unlike many of its counterparts, Kairos does not rely on ransomw...

Learn More
Jan 06, 2025
Hacker Forums Reveal ICAO Leak, SonicWall Vulnerability, and Other New...

Hacker Forums Reveal ICAO Leak, SonicWall Vulnerability, and Other New Exploit Sales Recent findings from SOCRadar’s Dark Web Team spotlight a series of alarming cyber threats surfacing on hacke...

Learn More
Jan 06, 2025
Cybersecurity in 2025: A Look Back at 2024’s Biggest Cyber Attacks &am...

Cybersecurity in 2025: A Look Back at 2024’s Biggest Cyber Attacks & Lessons for the Future The year 2024 saw a surge in high-profile cyber attacks across various industries, exposing the vulnerab...

Learn More
Jan 03, 2025
Dark Web Monitoring Tools and How They Benefit Businesses

Dark Web Monitoring Tools and How They Benefit Businesses Now as we all know, in depths of the internet lies the Dark Web, a hidden network where cybercriminals thrive. Here, stolen credentials, finan...

Learn More
Jan 03, 2025
Cerberus Unchained: The Multi-Stage Trojan Banking Campaign Targeting ...

Cerberus Unchained: The Multi-Stage Trojan Banking Campaign Targeting Android Devices The Cerberus Android banking trojan has reemerged in a sophisticated multi-stage attack campaign targeting banking...

Learn More