
Leveraging AI to Combat Insider Threats in Enterprises
Leveraging AI to Combat Insider Threats in Enterprises Insider threats represent a significant risk to enterprise security, often resulting in financial loss, reputational damage, and operational disr...

Is Your Personal Data for Sale on the Dark Web? Risks and Protection S...
Is Your Personal Data for Sale on the Dark Web? Risks and Protection Strategies The Dark Web has grown into a bustling market for stolen personal data, where cybercriminals trade sensitive information...

Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Serve...
Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Server The cybersecurity landscape is evolving at an unprecedented pace, with organizations facing increasingly sophisticated and persi...

Major Cyber Attacks Targeting the Telecommunication Industry (2023 - 2...
Major Cyber Attacks Targeting the Telecommunication Industry (2023 – 2024) The telecommunication industry plays a vital role in connecting the world, supporting everything from personal communications...

CISO's Guide to Navigating Dark Web Risks – How to Protect Your Organi...
CISO’s Guide to Navigating Dark Web Risks – How to Protect Your Organization As cyber threats grow increasingly sophisticated, Chief Information Security Officers (CISOs) are tasked with defendi...

Major Cyber Attacks in Review: November 2024
Major Cyber Attacks in Review: November 2024 November 2024 brought several high-profile cyber attacks that targeted critical sectors, including telecommunications, supply chain management, and healthc...

Dark Web Profile: Salt Typhoon
Dark Web Profile: Salt Typhoon [Update] February 15, 2025: “Salt Typhoon Exploited Cisco Router Flaws and Breached Telecoms” Salt Typhoon, a Chinese state-sponsored Advanced Persistent Threat (APT), h...

Critical Ivanti CSA Auth Bypass (CVE-2024-11639) Patched Alongside Oth...
Critical Ivanti CSA Auth Bypass (CVE-2024-11639) Patched Alongside Other High-Impact Flaws Ivanti recently released critical security updates to address several high-impact vulnerabilities in its prod...

Cryptojacking Campaign Targets Docker and Kubernetes: Surge in Contain...
Cryptojacking Campaign Targets Docker and Kubernetes: Surge in Container-Based Attacks A recent surge in cryptojacking campaigns has targeted unsecured Docker and Kubernetes environments, exploiting m...

December 2024 Patch Tuesday Update – One Actively Exploited Zero-Day, ...
December 2024 Patch Tuesday Update – One Actively Exploited Zero-Day, Multiple Critical RCEs; SAP Updates [Update] January 2, 2025: “PoC Exploit Available for Critical CVE-2024-49112 “LDAP Nightmare” ...

What Makes SOCRadar a Game-Changer in Threat Intelligence
What Makes SOCRadar a Game-Changer in Threat Intelligence Today, when cyber threats are advancing at a rate never seen before, it’s no longer enough to rely on static tools or fragmented solutions. Bu...

Termite Ransomware Attack on Blue Yonder: What You Need to Know
Termite Ransomware Attack on Blue Yonder: What You Need to Know In late November 2024, Blue Yonder, a critical provider of supply chain management solutions, fell victim to a ransomware attack attribu...

OpenWrt’s Attended SysUpgrade (ASU) Vulnerability Exposes Routers to M...
OpenWrt’s Attended SysUpgrade (ASU) Vulnerability Exposes Routers to Malicious Firmware Attacks OpenWrt, a popular open-source Linux-based embedded operating system, recently discovered a critical vul...

Dark Web Profile: Ymir Ransomware
Dark Web Profile: Ymir Ransomware The emergence of Ymir ransomware adds a new layer to the cybersecurity landscape, featuring advanced tactics that challenge traditional security defenses. Originating...

Top Software Weaknesses of 2024 by MITRE (Critical Insights for Every ...
Top Software Weaknesses of 2024 by MITRE (Critical Insights for Every Organization) The 2024 CWE Top 25 Most Dangerous Software Weaknesses list provides an essential roadmap for identifying the most p...

Renault India Breach, 147M Stealer Logs, Cardinal Health Leak, Univers...
Renault India Breach, 147M Stealer Logs, Cardinal Health Leak, University ESXi & Saudi Company Access Sales In the last week, SOCRadar’s Dark Web Team has identified multiple critical cyber threat...

Mitel MiCollab PoC Exploit Links CVE-2024-41713 and Zero-Day, Exposing...
Mitel MiCollab PoC Exploit Links CVE-2024-41713 and Zero-Day, Exposing Sensitive Files [Update] January 8, 2025: “CISA Adds Mitel MiCollab Vulnerabilities to KEV Catalog” Cyberattacks tar...

Top 10 Major Cyber Attacks Targeting E-Commerce Industry
Top 10 Major Cyber Attacks Targeting E-Commerce Industry The e-commerce industry has transformed global commerce, offering convenience and accessibility to millions of consumers worldwide. However, th...

Manson Market Takedown: Europol Aids Law Enforcement Operation to Disr...
Manson Market Takedown: Europol Aids Law Enforcement Operation to Disrupt Online Fraud The digital age has opened the way for increasingly sophisticated cybercriminal networks. These groups target ind...

How Tariffs Impact Supply Chain Security and Strategies to Mitigate Ri...
How Tariffs Impact Supply Chain Security and Strategies to Mitigate Risks Recent announcements regarding new tariffs on China, Mexico, and Canada highlight a looming shift in global trade dynamics. Wi...