Mar 08, 2022
'Dirty Pipe' Linux Vulnerability Discovered

‘Dirty Pipe’ Linux Vulnerability Discovered A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vul...

Learn More
Mar 07, 2022
Ex-Adafruit Employee's GitHub Repository Leaked

Ex-Adafruit Employee’s GitHub Repository Leaked Adafruit, which produces open-source hardware components, announced that a former employee had a data leak on their GitHub repository. The fact th...

Learn More
Mar 05, 2022
Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvid...

Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvidia Breach The infamous Lapsu$ Extortion Group has become a newsworthy threat actor while the cyber incidents escalated during the ...

Learn More
Mar 04, 2022
Future of Cybersecurity in the Era of Metaverse

Future of Cybersecurity in the Era of Metaverse Metaverse has become a subject that everyone is curious about very soon after it has found its place in the titles. It was claimed that the term, which ...

Learn More
Mar 04, 2022
Five Vulnerabilities Discovered in PJSIP Library This Week

Five Vulnerabilities Discovered in PJSIP Library This Week PJSIP, an open-source library, is one of the most used libraries used by WhatsApp and many other VoIP applications. Recently, critical RCE bu...

Learn More
Mar 03, 2022
Dark Web Threat Profile: Cuba Ransomware Group

Dark Web Threat Profile: Cuba Ransomware Group Cuba is a C++ based ransomware, and Cuba Ransomware group uses it as the final step payload for double extortion attacks. Operators utilize Cuba in combi...

Learn More
Mar 02, 2022
Timeline: The Russian - Ukranian Cyber Space Wars

Timeline: The Russian – Ukranian Cyber Space Wars February 13: A file matching the DDoS attack IoCs was uploaded to VirusTotal. February 15 & 16: Some Ukrainian websites were not accessible ...

Learn More
Mar 01, 2022
What Do Conti's Leaks Tell Us about Ransomware Groups?

What Do Conti’s Leaks Tell Us about Ransomware Groups? Conti, a dangerous ransomware gang that first appeared in December 2019, resided in Saint Petersburg, Russia, from the very beginning. Duri...

Learn More
Feb 28, 2022
The Week in Dark Web - 28 February 2022 - Ransomware Attacks and Data ...

The Week in Dark Web – 28 February 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware att...

Learn More
Feb 25, 2022
What You Need to Know About Russian Cyber Escalation in Ukraine

What You Need to Know About Russian Cyber Escalation in Ukraine UPDATE February 26, 2022, 04.40 AM (EST): This blog has been updated with details of posts of the Conti ransomware group and Anonymous. ...

Learn More
Feb 24, 2022
How Can You Avoid Potential Attacks with SOCRadar Integrations?

How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...

Learn More
Feb 23, 2022
Gartner Recognizes SOCRadar as ‘Both EASM and DRPS’ Vendor

Gartner Recognizes SOCRadar as ‘Both EASM and DRPS’ Vendor Gartner published “Quick Answer: What is the Difference Between EASM, DRPS, and SRS?” on February 21, 2022. SOCRadar was among th...

Learn More
Feb 15, 2022
SOCRadar's First Year-End Report: What Happened on the Deep Web in 202...

SOCRadar’s First Year-End Report: What Happened on the Deep Web in 2021?  In 2021, we saw that deep web monitoring and cybersecurity are essential to large corporations, governments, and ordinary peop...

Learn More
Feb 12, 2022
How To Track APT Groups and Get Fresh IOC/TTP?

How To Track APT Groups and Get Fresh IOC/TTP? 50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren’t even discovered by the victims themselves but through t...

Learn More
Feb 09, 2022
What is the Diamond Model of Intrusion Analysis?

What is the Diamond Model of Intrusion Analysis? The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its v...

Learn More
Feb 08, 2022
SOCRadar Turkey Threat Landscape Report: 'Skyrocketing Ransomware Thre...

SOCRadar Turkey Threat Landscape Report: ‘Skyrocketing Ransomware Threats in 2021’ Ransomware attacks are on the rise around the world. In 2021, we saw the names of various threat actors i...

Learn More
Feb 05, 2022
What is an Accellion Cyber Attack?

What is an Accellion Cyber Attack? Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospit...

Learn More
Feb 02, 2022
What is a Smishing Attack?

What is a Smishing Attack? Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and...

Learn More
Jan 31, 2022
What is The Intelligence Cycle?  

What is The Intelligence Cycle?   The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is ref...

Learn More
Jan 31, 2022
The Week in Dark Web - 31 January 2022 - Ransomware Attacks and Data L...

The Week in Dark Web – 31 January 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware atta...

Learn More