Dec 14, 2024
Leveraging AI to Combat Insider Threats in Enterprises

Leveraging AI to Combat Insider Threats in Enterprises Insider threats represent a significant risk to enterprise security, often resulting in financial loss, reputational damage, and operational disr...

Learn More
Dec 13, 2024
Is Your Personal Data for Sale on the Dark Web? Risks and Protection S...

Is Your Personal Data for Sale on the Dark Web? Risks and Protection Strategies The Dark Web has grown into a bustling market for stolen personal data, where cybercriminals trade sensitive information...

Learn More
Dec 13, 2024
Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Serve...

Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Server The cybersecurity landscape is evolving at an unprecedented pace, with organizations facing increasingly sophisticated and persi...

Learn More
Dec 13, 2024
Major Cyber Attacks Targeting the Telecommunication Industry (2023 - 2...

Major Cyber Attacks Targeting the Telecommunication Industry (2023 – 2024) The telecommunication industry plays a vital role in connecting the world, supporting everything from personal communications...

Learn More
Dec 12, 2024
CISO's Guide to Navigating Dark Web Risks – How to Protect Your Organi...

CISO’s Guide to Navigating Dark Web Risks – How to Protect Your Organization As cyber threats grow increasingly sophisticated, Chief Information Security Officers (CISOs) are tasked with defendi...

Learn More
Dec 12, 2024
Major Cyber Attacks in Review: November 2024

Major Cyber Attacks in Review: November 2024 November 2024 brought several high-profile cyber attacks that targeted critical sectors, including telecommunications, supply chain management, and healthc...

Learn More
Dec 12, 2024
Dark Web Profile: Salt Typhoon

Dark Web Profile: Salt Typhoon [Update] February 15, 2025: “Salt Typhoon Exploited Cisco Router Flaws and Breached Telecoms” Salt Typhoon, a Chinese state-sponsored Advanced Persistent Threat (APT), h...

Learn More
Dec 11, 2024
Critical Ivanti CSA Auth Bypass (CVE-2024-11639) Patched Alongside Oth...

Critical Ivanti CSA Auth Bypass (CVE-2024-11639) Patched Alongside Other High-Impact Flaws Ivanti recently released critical security updates to address several high-impact vulnerabilities in its prod...

Learn More
Dec 11, 2024
Cryptojacking Campaign Targets Docker and Kubernetes: Surge in Contain...

Cryptojacking Campaign Targets Docker and Kubernetes: Surge in Container-Based Attacks A recent surge in cryptojacking campaigns has targeted unsecured Docker and Kubernetes environments, exploiting m...

Learn More
Dec 11, 2024
December 2024 Patch Tuesday Update – One Actively Exploited Zero-Day, ...

December 2024 Patch Tuesday Update – One Actively Exploited Zero-Day, Multiple Critical RCEs; SAP Updates [Update] January 2, 2025: “PoC Exploit Available for Critical CVE-2024-49112 “LDAP Nightmare” ...

Learn More
Dec 10, 2024
What Makes SOCRadar a Game-Changer in Threat Intelligence

What Makes SOCRadar a Game-Changer in Threat Intelligence Today, when cyber threats are advancing at a rate never seen before, it’s no longer enough to rely on static tools or fragmented solutions. Bu...

Learn More
Dec 10, 2024
Termite Ransomware Attack on Blue Yonder: What You Need to Know

Termite Ransomware Attack on Blue Yonder: What You Need to Know In late November 2024, Blue Yonder, a critical provider of supply chain management solutions, fell victim to a ransomware attack attribu...

Learn More
Dec 10, 2024
OpenWrt’s Attended SysUpgrade (ASU) Vulnerability Exposes Routers to M...

OpenWrt’s Attended SysUpgrade (ASU) Vulnerability Exposes Routers to Malicious Firmware Attacks OpenWrt, a popular open-source Linux-based embedded operating system, recently discovered a critical vul...

Learn More
Dec 09, 2024
Dark Web Profile: Ymir Ransomware

Dark Web Profile: Ymir Ransomware The emergence of Ymir ransomware adds a new layer to the cybersecurity landscape, featuring advanced tactics that challenge traditional security defenses. Originating...

Learn More
Dec 09, 2024
Top Software Weaknesses of 2024 by MITRE (Critical Insights for Every ...

Top Software Weaknesses of 2024 by MITRE (Critical Insights for Every Organization) The 2024 CWE Top 25 Most Dangerous Software Weaknesses list provides an essential roadmap for identifying the most p...

Learn More
Dec 09, 2024
Renault India Breach, 147M Stealer Logs, Cardinal Health Leak, Univers...

Renault India Breach, 147M Stealer Logs, Cardinal Health Leak, University ESXi & Saudi Company Access Sales In the last week, SOCRadar’s Dark Web Team has identified multiple critical cyber threat...

Learn More
Dec 06, 2024
Mitel MiCollab PoC Exploit Links CVE-2024-41713 and Zero-Day, Exposing...

Mitel MiCollab PoC Exploit Links CVE-2024-41713 and Zero-Day, Exposing Sensitive Files [Update] January 8, 2025: “CISA Adds Mitel MiCollab Vulnerabilities to KEV Catalog”  Cyberattacks tar...

Learn More
Dec 06, 2024
Top 10 Major Cyber Attacks Targeting E-Commerce Industry

Top 10 Major Cyber Attacks Targeting E-Commerce Industry The e-commerce industry has transformed global commerce, offering convenience and accessibility to millions of consumers worldwide. However, th...

Learn More
Dec 06, 2024
Manson Market Takedown: Europol Aids Law Enforcement Operation to Disr...

Manson Market Takedown: Europol Aids Law Enforcement Operation to Disrupt Online Fraud The digital age has opened the way for increasingly sophisticated cybercriminal networks. These groups target ind...

Learn More
Dec 05, 2024
How Tariffs Impact Supply Chain Security and Strategies to Mitigate Ri...

How Tariffs Impact Supply Chain Security and Strategies to Mitigate Risks Recent announcements regarding new tariffs on China, Mexico, and Canada highlight a looming shift in global trade dynamics. Wi...

Learn More