Jan 16, 2023
4 Lessons Learned from Log4Shell

4 Lessons Learned from Log4Shell By SOCRadar Research Log4Shell vulnerability shook the cyber world to its core when it first became public in December 2021. It is a zero-day vulnerability d...

Learn More
Jan 13, 2023
Threat Actors Exploit CVE-2022-44877 RCE Vulnerability in CentOS Web P...

Threat Actors Exploit CVE-2022-44877 RCE Vulnerability in CentOS Web Panel (CWP) Update (16.01.2023): According to data gathered by researchers, the CVE-2022-46169 vulnerability in Cacti saw an increa...

Learn More
Jan 13, 2023
5 Lessons Learned from Ransomware Attacks in 2022

5 Lessons Learned from Ransomware Attacks in 2022 By SOCRadar Research In 2022, SOCRadar researchers detected over 1700 alleged ransomware victims. The total number was approximately 29% higher than i...

Learn More
Jan 11, 2023
Cacti Patched CVE-2022-46169 Critical RCE Vulnerability

Cacti Patched CVE-2022-46169 Critical RCE Vulnerability Cacti patched a critical security flaw to prevent arbitrary code execution on Cacti-running servers.  Cacti is an open-source, we...

Learn More
Jan 11, 2023
SOCRadar Free Dark Web Training: Learn How to Navigate in the Shadows

SOCRadar Free Dark Web Training: Learn How to Navigate in the Shadows The concept of the dark web plays a key role in today’s increasingly complex cybercrime ecosystem. Threat actors share the dataset...

Learn More
Jan 10, 2023
5 Lessons Learned from Data Breaches in 2022

5 Lessons Learned from Data Breaches in 2022 By SOCRadar Research Online products and services are growing daily. Consumers are entrusting more personal information to online databases, and businesses...

Learn More
Jan 09, 2023
Ransomware Gangs Leak Large Amounts of Data in Recent Attacks: Hive an...

Ransomware Gangs Leak Large Amounts of Data in Recent Attacks: Hive and Vice Society Ransomware gangs are known to release stolen data in retaliation if the ransom is not paid after successful encrypt...

Learn More
Jan 09, 2023
Dark Web Profile: Royal Ransomware

Dark Web Profile: Royal Ransomware By SOCRadar Research [Update] November 14, 2023: See the subheading: “CSA Update from CISA and FBI: Royal Ransomware’s Possible Rebranding to ‘Blacksuit’”  Ransomwar...

Learn More
Jan 09, 2023
The Week in Dark Web – 9 January 2023 – Access Sales and Data Leakes...

The Week in Dark Web – 9 January 2023 – Access Sales and Data Leakes Powered by DarkMirror™ Threat actors continue to target popular social networking platforms. Twitter was awash with two significant...

Learn More
Jan 06, 2023
Major Cyber Attacks in Review: December 2022

Major Cyber Attacks in Review: December 2022 In the last month, we have seen many cyber incidents, ranging from data breaches at retailers to various cyberattacks on cryptocurrency exchange platforms....

Learn More
Jan 05, 2023
200M+ Twitter Users' Email Addresses and 250M+ Deezer Users' Informati...

200M+ Twitter Users’ Email Addresses and 250M+ Deezer Users’ Information Leaked Online On a well-known hacker forum, a data leak containing the email addresses of 235 million Twitter users was made pu...

Learn More
Jan 04, 2023
The Week in Dark Web – 4 January 2023 – Access Sales, Data, and Malwar...

The Week in Dark Web – 4 January 2023 – Access Sales, Data, and Malware Leakes Powered by DarkMirror™ Entering the first week of the year, the most sensational incident on the dark web was the sale of...

Learn More
Jan 04, 2023
Synology Fixes a Max Severity RCE Vulnerability in VPN Server Products

Synology Fixes a Max Severity RCE Vulnerability in VPN Server Products Taiwanese NAS device manufacturer Synology has released a security update to address a critical vulnerability with a&nb...

Learn More
Jan 04, 2023
How Easy Is It to Guess Fortune 500 Executives' Passwords?

How Easy Is It to Guess Fortune 500 Executives’ Passwords? Recently, many cyberattacks on large corporations have begun with acquiring credentials via multiple methods, particularly social ...

Learn More
Jan 03, 2023
Secure Your Cloud Environment: 5 Best Practices

Secure Your Cloud Environment: 5 Best Practices With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to store, pr...

Learn More
Jan 03, 2023
10 Questions to ChatGPT: How It Can Change Cybersecurity

10 Questions to ChatGPT: How It Can Change Cybersecurity This blog is written with the help of OpenAI’s ChatGPT. In November 2022, OpenAI -an Artificial Intelligence research and deployment company- ...

Learn More
Jan 02, 2023
Dark Web Profile: MuddyWater APT Group

Dark Web Profile: MuddyWater APT Group [Update] April 19, 2023: Added subheading: “MuddyWater Uses SimpleHelp Tool for Persistence on Victim Devices” Security concerns grow day by day with the rise of...

Learn More
Dec 28, 2022
4 Lessons Learned from Supply Chain Attacks in 2022

4 Lessons Learned from Supply Chain Attacks in 2022 At the BlackBerry Security Summit in 2022, four-fifths of IT decision-makers said they had been notified of an attack or vulnerability in ...

Learn More
Dec 28, 2022
RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plug...

RCE Vulnerability (CVE-2022-45359) in Yith WooCommerce Gift Cards Plugin Exploited in Attacks In late November, security researchers found a critical vulnerability in Yith’s WooCommerce Gif...

Learn More
Dec 26, 2022
Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoi...

Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report Gartner’s report with comprehensive analysis and insights for endpoint security has been published. ...

Learn More