
Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘Yo...
Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re Fired’ Campaign Phishing remains one of the most prevalent and effective cyber attack methods, thriving on deceptio...

How to Protect Against Digital Risks in Three Steps
How to Protect Against Digital Risks in Three Steps threats to an organization’s digital assets are constantly evolving, cybercriminals are no longer solely focused on breaching your internal network;...

Dark Web Profile: Bashe (APT73)
Dark Web Profile: Bashe (APT73) Bashe, previously known as APT73 or Eraleig, is a ransomware group that emerged in 2024, employing tactics reminiscent of LockBit to target critical industries across d...

Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-5396...
Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-53961), Update Now A critical vulnerability in Adobe ColdFusion versions 2023 and 2021 has prompted urgent security updates. Alarmingl...

Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybers...
Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybersecurity Cyber weapons have emerged as powerful tools for nation-states, fundamentally altering the cybersecurity landscape. These ...

Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out
Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out In today’s fast-paced cybersecurity landscape, Managed Security Service Providers (MSSPs) face mounting pressure to deliver comprehensive ...

Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com A...
Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com Access Sale SOCRadar’s Dark Web Team uncovered alarming activity on hacker forums, including a powerful new Mirai botnet service fo...

Understanding Identity and Access Management (IAM)
Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and remote work have become the norm, managing who has access to sensitive data and systems will dete...

BeyondTrust Security Incident — Command Injection and Escalation Weakn...
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) [Update] January 14, 2025: “CVE-2024-12686 Enters the KEV Catalog” BeyondTrust’...

Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabi...
Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729) Recent security patches for Sophos Firewall address several serious vulner...

Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Exec...
Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Execution; Next.js Auth Bypass (CVE-2024-51479) Fortinet and the popular React framework Next.js have recently addressed serious secur...

The Year of Takedowns: Significant Law Enforcement Operations of 2024
The Year of Takedowns: Significant Law Enforcement Operations of 2024 As 2024 comes to a close, the global fight against cybercrime has witnessed a series of groundbreaking law enforcement operations ...

Dark Web Market: BidenCash
Dark Web Market: BidenCash Dark web markets have become a thriving hub for cybercriminals, trading stolen data, compromised credentials, and illicit tools. Among these, BidenCash has emerged as a sign...

Canada’s Top Cybersecurity Threats: How Attackers Target Critical Indu...
Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries As Canada experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cybe...

Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misad...
Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures If the events from dark web this series were a script, it would be the kind of thriller where everyone fumbles their part...

Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience...
Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience As India experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cyber threa...

Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – ...
Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s Latest Attack Vector [Update] February 25, 2025: “Cl0p Ransomware Expands Its Victim List with 183 Additional Organiz...

Chrome/Edge Exploit, Aliena Botnet, and Massive Data Breaches Uncovere...
Chrome/Edge Exploit, Aliena Botnet, and Massive Data Breaches Uncovered Hacker forums monitored by SOCRadar’s Dark Web Team have revealed several alarming cyber threats this week, including the sale o...

BadBox Malware Compromises 30,000 Devices in Germany
BadBox Malware Compromises 30,000 Devices in Germany The German Federal Office for Information Security (BSI) has taken decisive action to stop the BadBox malware campaign, which affected over 30,000 ...

The Future of AI-Powered Threat Detection in Cybersecurity
The Future of AI-Powered Threat Detection in Cybersecurity As cyber threats grow more sophisticated, the demand for advanced detection mechanisms becomes increasingly critical. AI-powered threat detec...