Sep 27, 2024
The Exodus Began: Alternatives for Telegram

The Exodus Began: Alternatives for Telegram As Telegram implements new policies to curb illegal activities by using AI to detect and hide unlawful content, threat actors are increasingly moving away f...

Learn More
Sep 26, 2024
Critical Vulnerabilities in Pure Storage & Aruba Access Points Pose Un...

Critical Vulnerabilities in Pure Storage & Aruba Access Points Pose Unauthorized Access, RCE Risks Security updates were released addressing critical vulnerabilities in both Pure Storage and Aruba...

Learn More
Sep 26, 2024
Severe Vulnerabilities in Cisco IOS, IOS XE and Other Products Address...

Severe Vulnerabilities in Cisco IOS, IOS XE and Other Products Addressed – Patch Now Cisco, a leading provider of network technologies, has issued new security advisories addressing 16 vulnerabilities...

Learn More
Sep 25, 2024
Top 10 CISO Statistics and Trends in Cybersecurity for 2024

Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-da...

Learn More
Sep 25, 2024
Critical Ivanti vTM Vulnerability Exploited (CVE-2024-7593); pgAdmin F...

Critical Ivanti vTM Vulnerability Exploited (CVE-2024-7593); pgAdmin Flaw Could Expose Data (CVE-2024-9014) Critical vulnerabilities in Ivanti vTM and PostgreSQL’s pgAdmin tool have recently come unde...

Learn More
Sep 24, 2024
How Machine Learning is Revolutionizing Cybersecurity

How Machine Learning is Revolutionizing Cybersecurity In today’s digital age, cyber threats multiply at an alarming rate, putting enormous pressure on organizations to strengthen their defenses....

Learn More
Sep 23, 2024
Chrome Security Evolution and Impact on Stealer Logs in the Undergroun...

Chrome Security Evolution and Impact on Stealer Logs in the Underground Market [Update] October 30, 2024: “New Tool Compromises Chrome’s Enhanced Cookie Encryption” As one of the most widely use...

Learn More
Sep 23, 2024
Deloitte Breach, Star Health Data, 100 Million Stealer Logs for Sale

Deloitte Breach, Star Health Data, 100 Million Stealer Logs for Sale Recent findings by the SOCRadar Dark Web Team reveal a series of alarming cyber incidents. Among them is the alleged data leak of D...

Learn More
Sep 20, 2024
Critical Vulnerability in Ivanti Cloud Services Appliance (CSA) Exploi...

Critical Vulnerability in Ivanti Cloud Services Appliance (CSA) Exploited in Attacks: CVE-2024-8963 Ivanti has disclosed a critical vulnerability identified as CVE-2024-8963, affecting its Cloud Servi...

Learn More
Sep 20, 2024
Dark Web Profile: Just Evil

Dark Web Profile: Just Evil [Update] October 23, 2024: “Founder of Just Evil and KillNet Allegedly Killed in Drone Attack” Just Evil is a pro-Russian cyber threat group formed in January 2024 by KillM...

Learn More
Sep 19, 2024
How the FBI Dismantled Raptor Train, a Major China State-Sponsored Bot...

How the FBI Dismantled Raptor Train, a Major China State-Sponsored Botnet In a major breakthrough, the FBI has recently dismantled “Raptor Train,” an extensive botnet controlled by state-s...

Learn More
Sep 19, 2024
Safeguarding Your Business: The Importance of Fraud Protection

Safeguarding Your Business: The Importance of Fraud Protection In the past, banks employed various methods to protect their customers’ money. They installed heavy-duty vaults made of steel and iron to...

Learn More
Sep 18, 2024
UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War...

UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War an Overview As the Russia-Ukraine war unfolds, its impact extends far beyond the battlefield, rippling through cyberspace and aff...

Learn More
Sep 18, 2024
Critical Patches Released for VMware vCenter Server and GitLab (CVE-20...

Critical Patches Released for VMware vCenter Server and GitLab (CVE-2024-38812, CVE-2024-45409) [Update] October 7, 2024: “PoC Exploit and Details Released for CVE-2024-45409 Affecting GitLab...

Learn More
Sep 18, 2024
Top 10 Free Penetration Testing Tools

Top 10 Free Penetration Testing Tools Penetration testing, or pentesting, is a security practice where real-world attacks are simulated on an organization’s systems to identify vulnerabilities and sec...

Learn More
Sep 17, 2024
SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead o...

SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead of Cyber Threats Cyber threats come in many forms, driven by diverse motivations from ransomware that seeks financial gain to polit...

Learn More
Sep 17, 2024
Cyber Insurance and Protecting Against Security Breaches

Cyber Insurance and Protecting Against Security Breaches With the rise of digital threats, cyber insurance has become an important part of risk management for businesses of all sizes. As cyberattacks ...

Learn More
Sep 16, 2024
Major Cyber Attacks in Review: August 2024

Major Cyber Attacks in Review: August 2024 August 2024 witnessed a series of impactful cyber attacks targeting industries from airport services in Canada to key financial institutions in the U.S. This...

Learn More
Sep 16, 2024
Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Dat...

Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Data Exposed The SOCRadar Dark Web Team continues its diligent monitoring of the hacker landscape; several significant cyber threats ...

Learn More
Sep 13, 2024
The Buyer's Guide to Extended Threat Intelligence - SOCRadar

The Buyer’s Guide to Extended Threat Intelligence – SOCRadar Imagine walking into the office on a regular Tuesday morning. As the CISO, you grab your coffee, sit at your desk, and are immediately floo...

Learn More