Sep 02, 2024
Citrix RDP Access, Jenkins Exploit, and Major Database Leak of Union B...

Citrix RDP Access, Jenkins Exploit, and Major Database Leak of Union Bank of India In the past week, the SOCRadar Dark Web Team has uncovered a series of alarming cyber threats involving unauthorized ...

Learn More
Sep 02, 2024
Exploits Released for Critical Flaws in WhatsUp Gold and Jenkins, Patc...

Exploits Released for Critical Flaws in WhatsUp Gold and Jenkins, Patch Now (CVE-2024-6670, CVE-2024-43044) [Update] September 13, 2024: “Exploitation Activity on Progress WhatsUp Gold Vulnerabilities...

Learn More
Sep 02, 2024
Dark Web Profile: Abyss Ransomware

Dark Web Profile: Abyss Ransomware In 2023, Abyss Locker ransomware emerged as a critical cybersecurity threat, aggressively targeting Windows and Linux systems across industries like finance, manufac...

Learn More
Aug 29, 2024
What Type of Social Engineering Targets Senior Officials

What Type of Social Engineering Targets Senior Officials Cybercriminals often utilize various social engineering tactics to manipulate and take advantage of human psychology to trick others into discl...

Learn More
Aug 29, 2024
What is DDoSia Project?

What is DDoSia Project? The DDoSia project is a cyber threat, a tool, leveraging the disruptive power of distributed denial-of-service (DDoS) attacks to target critical infrastructure and governmental...

Learn More
Aug 29, 2024
Biggest Healthcare Industry Attacks (2023 - 2024)

Biggest Healthcare Industry Attacks (2023 – 2024) The healthcare industry has become an increasingly favored target for cybercriminals, with the financial impact of breaches being particularly severe....

Learn More
Aug 28, 2024
Top 10 Threat Actors of 2024: Beyond the Numbers

Top 10 Threat Actors of 2024: Beyond the Numbers Although 2024 isn’t over yet, the cyber landscape has already witnessed significant developments. This year has been shaped by a complex network of thr...

Learn More
Aug 28, 2024
Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under A...

Pre-Auth RCE Vulnerability in Apache OFBiz (CVE-2024-38856) Is Under Active Exploitation, CISA Warns [Update] September 6, 2024: “New RCE Vulnerability (CVE-2024-45195) Discovered in Apache OFBi...

Learn More
Aug 28, 2024
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2...

The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024 In 2024, ransomware will continue to rank as one of the most pervasive and effective threats to organizations globally. Attack...

Learn More
Aug 27, 2024
Alleged Sales: AMD Breach, U.S. Tax Portal Access, and Fortinet Exploi...

Alleged Sales: AMD Breach, U.S. Tax Portal Access, and Fortinet Exploit Recent findings by the SOCRadar Dark Web Team highlight several significant cyber threats targeting various organizations. Among...

Learn More
Aug 27, 2024
Tracking the Cookies: The World of Data Brokers

Tracking the Cookies: The World of Data Brokers Data brokers are companies that specialize in collecting, processing, and selling large amounts of personal and business data. They gather information ...

Learn More
Aug 27, 2024
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurt...

Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández This interview is part of our ongoing series with industry leaders who share their experiences and strategies in the...

Learn More
Aug 26, 2024
Vulnerability in Python's pandas Library (CVE-2024-42992)

Vulnerability in Python’s pandas Library (CVE-2024-42992) [Update] August 27, 2024: CVE has been marked “REJECT” in the CVE List. Find more information in the blog post. Python’s popular data analysis...

Learn More
Aug 26, 2024
How to Identify Spear Phishing Attacks

How to Identify Spear Phishing Attacks Spear phishing remains one of the most effective tactics cybercriminals use to breach enterprise networks. These highly targeted attacks have only increased in r...

Learn More
Aug 25, 2024
The Dominant Role of Compromised Credentials in Data Breaches

The Dominant Role of Compromised Credentials in Data Breaches Compromised credentials are at the heart of modern cyber threats, driving a significant portion of data breaches across industries. Approx...

Learn More
Aug 24, 2024
Examples of AI-Assisted Cyber Attacks

Examples of AI-Assisted Cyber Attacks AI-assisted cyberattacks, driven by the rapid advancements in generative AI, have become a significant concern in the cybersecurity landscape. Cybercriminals are ...

Learn More
Aug 23, 2024
Secure the Credentials: How to Work With Breach Datasets

Secure the Credentials: How to Work With Breach Datasets Data breaches have become an increasingly common and devastating threat to businesses of all sizes. The need for proactive measures to secure y...

Learn More
Aug 23, 2024
Best Threat Detection and Response (TDR) Practices

Best Threat Detection and Response (TDR) Practices The ability to detect and respond to threats swiftly is more critical than ever. Organizations must adopt a robust Threat Detection and Response (TDR...

Learn More
Aug 22, 2024
Advanced Strategies for Effective Network Security Monitoring

Advanced Strategies for Effective Network Security Monitoring Network Security Monitoring (NSM) is critical for safeguarding an organization’s IT infrastructure against cyber threats. It involves coll...

Learn More
Aug 21, 2024
What is IOC Management?

What is IOC Management? IOC Management is a critical aspect of cybersecurity that involves identifying, handling, and responding to data points indicating potential security breaches or malicious acti...

Learn More