
Recent Data Breaches: Hyundai, NorthOne Bank, and Kodi
Recent Data Breaches: Hyundai, NorthOne Bank, and Kodi Data breaches have become widespread in the digital age, leaving companies and individuals at risk of cyber attacks. Three high-profile companies...

Microsoft and SAP Release Security Updates to Address Critical Vulnera...
Microsoft and SAP Release Security Updates to Address Critical Vulnerabilities Microsoft has released new security updates on the Patch Tuesday April 2023, to address 97 vulnerabilities. One...

CISA Warns: Patch Apple Zero-Day Vulnerabilities Until May
CISA Warns: Patch Apple Zero-Day Vulnerabilities Until May Apple released patches on April 7 to address two zero-day vulnerabilities, CVE-2023-28205 and CVE-2023-28206. The vendor acknowledges a ...

What's Next for Cybercrime Ecosystem After Genesis Market Takedown?
What’s Next for Cybercrime Ecosystem After Genesis Market Takedown? One can desire the forbidden, as is the narrative in the Genesis chapter of the Old Testament. In today’s digital world,...

Major Cyberattacks in Review: March 2023
Major Cyberattacks in Review: March 2023 Cybersecurity remains a major concern for organizations of all sizes as cyberattacks become more sophisticated and frequent. Despite efforts to enhan...

Critical Vulnerability in vm2 JavaScript Sandbox Library: Exploit Code...
Critical Vulnerability in vm2 JavaScript Sandbox Library: Exploit Code Available [April 19, 2023] Update: Added subheading: “Patches Released for New Vulnerabilities: CVE-2023-29199 and CVE-2023-30547...

MSI Breach, Operation Cookie Monster & Data Sales
MSI Breach, Operation Cookie Monster & Data Sales Powered by DarkMirror™ Ransomware attacks continue to be a nightmare for organizations. The Money Message group made a name for itself for a while...

Cisco Releases Patches for Vulnerabilities in Multiple Products
Cisco Releases Patches for Vulnerabilities in Multiple Products Cisco, this week released updates to fix various security vulnerabilities in its products. These updates also cover serious issues affec...

What is a Phishing Kit?
What is a Phishing Kit? A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with li...

New Rorschach Ransomware: The Fastest Encryptor
New Rorschach Ransomware: The Fastest Encryptor Researchers have discovered a new ransomware strain called Rorschach. This sophisticated and fast form of malware was used to target a company based in ...

How SOCRadar Can Help Fraud Teams?
How SOCRadar Can Help Fraud Teams? Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made...

Hackers Exploit WinRAR SFX Archives to Install Backdoors Undetected
Hackers Exploit WinRAR SFX Archives to Install Backdoors Undetected Threat actors exploit WinRAR self-extracting (SFX) archives containing decoy files by adding malicious functionality to in...

Attackers Actively Exploit Vulnerabilities in Unpatched Products: Zimb...
Attackers Actively Exploit Vulnerabilities in Unpatched Products: Zimbra, IBM Aspera Faspex, Cacti, Realtek Threat actors are actively exploiting security vulnerabilities in Zimbra, IBM Aspera Fa...

How SOCRadar Can Help You with Threat Hunting?
How SOCRadar Can Help You with Threat Hunting? This article briefly explains threat hunting and SOCRadar’s ability to use the feature. If you are still reading this, we invite you to try SOCRadar XTI ...

Notorious Ransomware Gangs on Attack Spree
Notorious Ransomware Gangs on Attack Spree Powered by DarkMirror™ In the dark web summary of the previous week, we talked about the victims that the Clop ransomware group has repeatedly revealed. Prob...

Misconfigured Azure Active Directory (AAD) Could Lead to Unauthorized ...
Misconfigured Azure Active Directory (AAD) Could Lead to Unauthorized Access and Bing Takeover Recently, cybersecurity company Wiz discovered a misconfiguration issue in Azure Active Directory (A...

AlienFox Toolkit Targets Cloud Web Hosting Frameworks to Steal Credent...
AlienFox Toolkit Targets Cloud Web Hosting Frameworks to Steal Credentials Cybercriminals are using a new toolkit called AlienFox to steal login credentials and sensitive data from cloud-based email s...

Customer Story: Social Media Takedown in the Gulf Region
Customer Story: Social Media Takedown in the Gulf Region The birth and growth of social media were one of the events shaping the last decades. It started with a straightforward idea (connecting with y...

APT Profile: APT-C-35 / DoNot Team
APT Profile: APT-C-35 / DoNot Team [Update] June 20, 2023: A new espionage campaign attributed to APT-C-35 (DoNot Team) targets users in Pakistan with trojanized apps on Google Play, added the subhead...

What Is Cyber Threat Intelligence?
What Is Cyber Threat Intelligence? The swift adoption of information technology has coincided with an alarming surge in cyber-attacks, as malicious actors deploy increasingly sophisticated exploits. T...