
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a pop...

What You Need to Know About Cisco Unified Communications Manager SQL I...
What You Need to Know About Cisco Unified Communications Manager SQL Injection Vulnerability (CVE-2023-20211) In today’s connected world, efficient tools like the Cisco Unified Communications Manager ...

The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Soft...
The Wolf in Sheep’s Clothing: How Cybercriminals Abuse Legitimate Software [Update] November 9, 2023: Added FBI’s notice, see under the title: “FBI Warns of Ransomware Threats via Th...

Dark Web Profile: Bjorka
Dark Web Profile: Bjorka In the ever-evolving landscape of cyber threats, understanding the profiles of individual threat actors is crucial for both governments and private organizations to take actio...

AnonFiles Forced to Shut Down Due to Surge of Malicious Utilization
AnonFiles Forced to Shut Down Due to Surge of Malicious Utilization [Update] August 18, 2023: The effects of the AnonFiles service’s closure have started coming into view. See the subheading: “C...

The Rising Anxiety Over LinkedIn Account Takeover Claims
The Rising Anxiety Over LinkedIn Account Takeover Claims In an age dominated by the digital, online platforms like LinkedIn have become vital components of our professional identities. But as we incre...

Possible Cyber Threats in the 2024 Olympics
Possible Cyber Threats in the 2024 Olympics The design of the Paris 2024 Olympic and Paralympic torch, introduced on July 25, 2023, struck the first gong for The Paris 2024 Summer Olympic and Paralymp...

Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32...
Ivanti Avalanche Critical Buffer Overflow Vulnerabilities: CVE-2023-32560 Two critical vulnerabilities, collectively identified as CVE-2023-32560, have been discovered within Ivanti Avalanche, an ente...

SMS Bomber: How Dangerous Can a Text Be?
SMS Bomber: How Dangerous Can a Text Be? Among the ever-evolving threats in the world of cybersecurity, SMS Bomber attacks are emerging as a modern danger that can have significant and disturbing cons...

How Browser Sync Can Unknowingly Risk Your Business
How Browser Sync Can Unknowingly Risk Your Business An innocuous and maybe a hard worker employee sought to simplify their routines, inadvertently setting a sinister chain of events in motion; they ma...

Top 5 Dark Web Search Engines
Top 5 Dark Web Search Engines For the latest version check Top 10 Dark Web Search Engines in 2025. Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In th...

Evil-GPT Sale, Paramount Plus and Casio Data Leak & Unauthorized A...
Evil-GPT Sale, Paramount Plus and Casio Data Leak & Unauthorized Access Sales The SOCRadar Dark Web Team continuously uncovers incidents that endanger various entities by monitoring the hidden rec...

High-Severity Vulnerabilities in CODESYS V3 SDK and Python’s URLlib.pa...
High-Severity Vulnerabilities in CODESYS V3 SDK and Python’s URLlib.parse Library The widely-used industrial software development kit, CODESYS, has been found to harbor multiple security vulnerabiliti...

What is EMOTET Malware and How to Protect Yourself
What is EMOTET Malware and How to Protect Yourself According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attac...

New Malware “Statc Stealer” Targets Windows Devices to Steal Browser D...
New Malware “Statc Stealer” Targets Windows Devices to Steal Browser Data, Cryptowallets, and More Researchers have identified a new information-stealing malware named “Statc Stealer.” Thi...

New Global Phishing Scam Exposed: Facebook and Instagram Users Targete...
New Global Phishing Scam Exposed: Facebook and Instagram Users Targeted by Fake Crypto Platform The thrill of curiosity! It is the spark that drives innovation, leads us to explore new horizons, and s...

The "Downfall" Effect: Intel CPUs May Leak Sensitive Information
The “Downfall” Effect: Intel CPUs May Leak Sensitive Information On August 9, Intel and the discoverer of the vulnerability, Daniel Moghimi, unveiled a fresh exploit named Downfall. This n...

EvilProxy Account Takeover Campaign Targets Key Executives
EvilProxy Account Takeover Campaign Targets Key Executives An escalating threat, named EvilProxy, combines advanced Adversary-in-the-Middle (AitM) phishing with sophisticated Account Takeover (AT...

SOCRadar Unveils 'Treemium': Report a Bug, Plant a Future with SOCRada...
SOCRadar Unveils ‘Treemium’: Report a Bug, Plant a Future with SOCRadar We are overjoyed to pull back the curtain on a new initiative from SOCRadar – Treemium! This new initiative, rooted ...

Microsoft’s August 2023 Patch Tuesday Fixes Six Critical Vulnerabiliti...
Microsoft’s August 2023 Patch Tuesday Fixes Six Critical Vulnerabilities and Two Exploited Zero-Days Microsoft’s August 2023 Patch Tuesday has just arrived. The update addresses a total of 74 vulnerab...