
'Dirty Pipe' Linux Vulnerability Discovered
‘Dirty Pipe’ Linux Vulnerability Discovered A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vul...

Ex-Adafruit Employee's GitHub Repository Leaked
Ex-Adafruit Employee’s GitHub Repository Leaked Adafruit, which produces open-source hardware components, announced that a former employee had a data leak on their GitHub repository. The fact th...

Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvid...
Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvidia Breach The infamous Lapsu$ Extortion Group has become a newsworthy threat actor while the cyber incidents escalated during the ...

Future of Cybersecurity in the Era of Metaverse
Future of Cybersecurity in the Era of Metaverse Metaverse has become a subject that everyone is curious about very soon after it has found its place in the titles. It was claimed that the term, which ...

Five Vulnerabilities Discovered in PJSIP Library This Week
Five Vulnerabilities Discovered in PJSIP Library This Week PJSIP, an open-source library, is one of the most used libraries used by WhatsApp and many other VoIP applications. Recently, critical RCE bu...

Dark Web Threat Profile: Cuba Ransomware Group
Dark Web Threat Profile: Cuba Ransomware Group Cuba is a C++ based ransomware, and Cuba Ransomware group uses it as the final step payload for double extortion attacks. Operators utilize Cuba in combi...

Timeline: The Russian - Ukranian Cyber Space Wars
Timeline: The Russian – Ukranian Cyber Space Wars February 13: A file matching the DDoS attack IoCs was uploaded to VirusTotal. February 15 & 16: Some Ukrainian websites were not accessible ...

What Do Conti's Leaks Tell Us about Ransomware Groups?
What Do Conti’s Leaks Tell Us about Ransomware Groups? Conti, a dangerous ransomware gang that first appeared in December 2019, resided in Saint Petersburg, Russia, from the very beginning. Duri...

The Week in Dark Web - 28 February 2022 - Ransomware Attacks and Data ...
The Week in Dark Web – 28 February 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware att...

What You Need to Know About Russian Cyber Escalation in Ukraine
What You Need to Know About Russian Cyber Escalation in Ukraine UPDATE February 26, 2022, 04.40 AM (EST): This blog has been updated with details of posts of the Conti ransomware group and Anonymous. ...

How Can You Avoid Potential Attacks with SOCRadar Integrations?
How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...

Gartner Recognizes SOCRadar as ‘Both EASM and DRPS’ Vendor
Gartner Recognizes SOCRadar as ‘Both EASM and DRPS’ Vendor Gartner published “Quick Answer: What is the Difference Between EASM, DRPS, and SRS?” on February 21, 2022. SOCRadar was among th...

SOCRadar's First Year-End Report: What Happened on the Deep Web in 202...
SOCRadar’s First Year-End Report: What Happened on the Deep Web in 2021? In 2021, we saw that deep web monitoring and cybersecurity are essential to large corporations, governments, and ordinary peop...

How To Track APT Groups and Get Fresh IOC/TTP?
How To Track APT Groups and Get Fresh IOC/TTP? 50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren’t even discovered by the victims themselves but through t...

What is the Diamond Model of Intrusion Analysis?
What is the Diamond Model of Intrusion Analysis? The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its v...

SOCRadar Turkey Threat Landscape Report: 'Skyrocketing Ransomware Thre...
SOCRadar Turkey Threat Landscape Report: ‘Skyrocketing Ransomware Threats in 2021’ Ransomware attacks are on the rise around the world. In 2021, we saw the names of various threat actors i...

What is an Accellion Cyber Attack?
What is an Accellion Cyber Attack? Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospit...

What is a Smishing Attack?
What is a Smishing Attack? Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and...

What is The Intelligence Cycle?
What is The Intelligence Cycle? The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is ref...

The Week in Dark Web - 31 January 2022 - Ransomware Attacks and Data L...
The Week in Dark Web – 31 January 2022 – Ransomware Attacks and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware atta...