Latest articles from SOCRadar
Anonymous Russia's botnet service Tesla-bot announced a new malicious service model on its Telegram channel. This new type of service and concept, which they call as TaaS (Threat as a Service), appears to be a… Continue Reading
Cisco recently issued an advisory regarding a zero-day vulnerability, CVE-2023-20269, in its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) products. The zero-day vulnerability has been exploited in the wild, with reports indicating that… Continue Reading
The SOCRadar Dark Web Team conducts continuous monitoring of the dark web, uncovering the latest threats that require your attention. In this week's update, there were reports of unauthorized access sales related to a Mexican… Continue Reading
In a recent update, a well-known and notorious threat actor declared their targeting of Telegram. This group initiated the attack after Telegram's decision to ban their primary account on the messaging platform. The actor in… Continue Reading
August 2023 has not passed without its share of significant cyberattacks. Among the incidents of last month, we have observed multiple data breaches involving well-known threat actors. Specifically, the MOVEit Transfer attacks carried out by… Continue Reading
In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups from underground circles. The channels, groups and private chat rooms established by threat actors have exponentially… Continue Reading
Microsoft previously disclosed the successful thwarting of an attack orchestrated by Storm-0558, a threat actor based in China. The breach, reported on June 16, 2023, allowed the threat actors to infiltrate Microsoft accounts by exploiting… Continue Reading
Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Intelligence Platforms create intelligence information by gathering raw threat data and security-related information from multiple sources, both… Continue Reading
Security researchers have recently unearthed three security vulnerabilities affecting several ASUS router models. ASUS, renowned as one of the leading networking manufacturers, boasts a substantial global user base of gamers, streamers, and various other consumers… Continue Reading
In ancient Greek mythology, Medusa stands as one of the most iconic and feared figures. With a head full of venomous snakes in place of hair, she had the power to turn anyone who gazed… Continue Reading
Introducing our weekly Dark Web digest, where we explore the most recent occurrences in the online underworld. Our dedicated SOCRadar Dark Web Team has been hard at work unearthing critical discoveries that demand your attention. … Continue Reading
On the 13th of August, The LockBit Ransomware group added a new victim to its list. The victim supplier, manufacturing company Zaun, expressed its belief that no classified information had been downloaded. However, reports suggested… Continue Reading
Since Microsoft disabled Macros by default, threat actors have actively experimented with alternative attack methods. They utilize various other file structures to distribute malicious content to their victims. Notably, notorious malware strains like Emotet, QakBot,… Continue Reading
Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly discovered vulnerabilities, new attack methodologies, and the tactics, techniques, and procedures (TTPs) used by emerging cyber attackers. Consequently,… Continue Reading
Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching coordinated efforts to combat ransomware groups through law enforcement takedowns, cryptocurrency seizures, and indictments, the crime continues to… Continue Reading
From Nigerian Princes to Crafty Codes: The Evolution of Phishing Remember the days when our inboxes were graced by those endearing messages from a distant "Nigerian Prince"? Ah, good times, right? If you're thinking, "What… Continue Reading
[Update] November 22, 2023: See the subheading "Possible Successors of QakBot: DarkGate and Pikabot." [Update] October 9, 2023: See the subheading: "Potential QakBot Resurgence." Qakbot, a versatile second-stage malware endowed with backdoor capabilities, was initially… Continue Reading
Welcome to this week's Dark Web roundup, where we delve into the latest unsettling incidents that have emerged from the depths of the hidden online realm. Our SOCRadar Dark Web Team has been busy digging… Continue Reading
In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too familiar. The unsettling scam call appears to be from a legitimate government… Continue Reading
In today's interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs when threat actors target organizations by focusing on weaker links in their supply… Continue Reading