Citrix RDP Access, Jenkins Exploit, and Major Database Leak of Union B...
Citrix RDP Access, Jenkins Exploit, and Major Database Leak of Union Bank of India In the past week, the SOCRadar Dark Web Team has uncovered a series of alarming cyber threats involving unauthorized ...
Exploits Released for Critical Flaws in WhatsUp Gold and Jenkins, Patc...
Exploits Released for Critical Flaws in WhatsUp Gold and Jenkins, Patch Now (CVE-2024-6670, CVE-2024-43044) [Update] September 13, 2024: “Exploitation Activity on Progress WhatsUp Gold Vulnerabilities...
Dark Web Profile: Abyss Ransomware
Dark Web Profile: Abyss Ransomware In 2023, Abyss Locker ransomware emerged as a critical cybersecurity threat, aggressively targeting Windows and Linux systems across industries like finance, manufac...
What Type of Social Engineering Targets Senior Officials
What Type of Social Engineering Targets Senior Officials Cybercriminals often utilize various social engineering tactics to manipulate and take advantage of human psychology to trick others into discl...
What is DDoSia Project?
What is DDoSia Project? The DDoSia project is a cyber threat, a tool, leveraging the disruptive power of distributed denial-of-service (DDoS) attacks to target critical infrastructure and governmental...
Biggest Healthcare Industry Attacks (2023 - 2024)
Biggest Healthcare Industry Attacks (2023 – 2024) The healthcare industry has become an increasingly favored target for cybercriminals, with the financial impact of breaches being particularly severe....
Top 10 Threat Actors of 2024: Beyond the Numbers
Top 10 Threat Actors of 2024: Beyond the Numbers Although 2024 isn’t over yet, the cyber landscape has already witnessed significant developments. This year has been shaped by a complex network of thr...
Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under A...
Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under Active Exploitation, CISA Warns [Update] September 6, 2024: “New RCE Vulnerability (CVE-2024-45195) Discovered in Apache OFBi...
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2...
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024 In 2024, ransomware will continue to rank as one of the most pervasive and effective threats to organizations globally. Attack...
Alleged Sales: AMD Breach, U.S. Tax Portal Access, and Fortinet Exploi...
Alleged Sales: AMD Breach, U.S. Tax Portal Access, and Fortinet Exploit Recent findings by the SOCRadar Dark Web Team highlight several significant cyber threats targeting various organizations. Among...
Tracking the Cookies: The World of Data Brokers
Tracking the Cookies: The World of Data Brokers Data brokers are companies that specialize in collecting, processing, and selling large amounts of personal and business data. They gather information ...
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurt...
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández This interview is part of our ongoing series with industry leaders who share their experiences and strategies in the...
Vulnerability in Python's pandas Library (CVE-2024-42992)
Vulnerability in Python’s pandas Library (CVE-2024-42992) [Update] August 27, 2024: CVE has been marked “REJECT” in the CVE List. Find more information in the blog post. Python’s popular data analysis...
How to Identify Spear Phishing Attacks
How to Identify Spear Phishing Attacks Spear phishing remains one of the most effective tactics cybercriminals use to breach enterprise networks. These highly targeted attacks have only increased in r...
The Dominant Role of Compromised Credentials in Data Breaches
The Dominant Role of Compromised Credentials in Data Breaches Compromised credentials are at the heart of modern cyber threats, driving a significant portion of data breaches across industries. Approx...
Examples of AI-Assisted Cyber Attacks
Examples of AI-Assisted Cyber Attacks AI-assisted cyberattacks, driven by the rapid advancements in generative AI, have become a significant concern in the cybersecurity landscape. Cybercriminals are ...
Secure the Credentials: How to Work With Breach Datasets
Secure the Credentials: How to Work With Breach Datasets Data breaches have become an increasingly common and devastating threat to businesses of all sizes. The need for proactive measures to secure y...
Best Threat Detection and Response (TDR) Practices
Best Threat Detection and Response (TDR) Practices The ability to detect and respond to threats swiftly is more critical than ever. Organizations must adopt a robust Threat Detection and Response (TDR...
Advanced Strategies for Effective Network Security Monitoring
Advanced Strategies for Effective Network Security Monitoring Network Security Monitoring (NSM) is critical for safeguarding an organization’s IT infrastructure against cyber threats. It involves coll...
What is IOC Management?
What is IOC Management? IOC Management is a critical aspect of cybersecurity that involves identifying, handling, and responding to data points indicating potential security breaches or malicious acti...