Free Trial
Dark Web Report
Dec 31, 2024
Chinese State-Sponsored Threat Actors Breach U.S. Treasury Department ...

Chinese State-Sponsored Threat Actors Breach U.S. Treasury Department in Major Cybersecurity Incident [Update] January 7, 2025: “CISA Provides Update on U.S. Treasury Breach”  Chinese state-sponsored ...

Learn More
Dec 31, 2024
Four-Faith Routers Exploited Through CVE-2024-12856 Vulnerability

Four-Faith Routers Exploited Through CVE-2024-12856 Vulnerability A newly discovered vulnerability, tracked as CVE-2024-12856, is actively being exploited in Four-Faith routers. This vulnerability all...

Learn More
Dec 31, 2024
Dark Web Profile: Gamaredon APT

Dark Web Profile: Gamaredon APT Gamaredon APT is a notorious Russian cyber espionage group active since 2013. Closely linked to Moscow’s Federal Security Service (FSB), it has primarily targeted...

Learn More
Dec 30, 2024
Exploring Telegram DDoS Groups: Threats, Tools, and Evolving Strategie...

Exploring Telegram DDoS Groups: Threats, Tools, and Evolving Strategies Telegram-based hacktivist groups have established themselves as a critical component of the modern cyber threat landscape. These...

Learn More
Dec 30, 2024
Tracking Cybercriminals on the Dark Web: The Role of AI-Powered Threat...

Tracking Cybercriminals on the Dark Web: The Role of AI-Powered Threat Intelligence The Dark Web has long been a hub for illicit activities. It serves as a marketplace for stolen data, malware, and ha...

Learn More
Dec 30, 2024
DUX Health Leak, Energy Sector Breaches, Chrome Exploit, Spotify Tool,...

DUX Health Leak, Energy Sector Breaches, Chrome Exploit, Spotify Tool, and More Dark Web Highlights Hacker forums are buzzing with alarming activity this week, with SOCRadar’s Dark Web Team uncovering...

Learn More
Dec 30, 2024
Phishing Attack Compromises Cyberhaven’s Chrome Extension, Impacts Tho...

Phishing Attack Compromises Cyberhaven’s Chrome Extension, Impacts Thousands – What You Need to Know [Update] January 2, 2025: “New Details on the Chrome Extension Phishing Attack” A significant cyber...

Learn More
Dec 28, 2024
The Threat of SIM Swapping Attacks on Financial Institutions

The Threat of SIM Swapping Attacks on Financial Institutions SIM swapping attacks have evolved into a growing threat in the digital age, affecting not only individuals but, through them, financial ins...

Learn More
Dec 27, 2024
Top 10 Identity Attacks in 2024: Protecting Credentials in a Digital W...

Top 10 Identity Attacks in 2024: Protecting Credentials in a Digital World In 2024, identity attacks have advanced to new levels of sophistication, targeting credentials with ruthlessness. From wreaki...

Learn More
Dec 27, 2024
Severe Vulnerability in Palo Alto Networks PAN-OS Exposes Firewalls to...

Severe Vulnerability in Palo Alto Networks PAN-OS Exposes Firewalls to Denial of Service (CVE-2024-3393) [Update] December 31, 2024: CVE-2024-3393 has been added to the CISA KEV catalog* Palo Alto Net...

Learn More
Dec 27, 2024
Dark Web Profile: Storm-842 (Void Manticore)

Dark Web Profile: Storm-842 (Void Manticore) On September 23, 2022, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory ...

Learn More
Dec 26, 2024
Cyber Threat Intelligence for Supply Chain Security

Cyber Threat Intelligence for Supply Chain Security Modern supply chains are more connected than ever, forming the backbone of global commerce. However, this interconnectivity also makes them prime ta...

Learn More
Dec 26, 2024
Dark Web Profile: Trinity Ransomware

Dark Web Profile: Trinity Ransomware First discovered in May 2024, the Trinity ransomware has quickly positioned itself as a significant actor in the threat landscape. Leveraging a double extortion ta...

Learn More
Dec 25, 2024
DarkVision RAT: A Persistent Threat Delivered via PureCrypter

DarkVision RAT: A Persistent Threat Delivered via PureCrypter The DarkVision RAT malware campaign leverages the PureCrypter loader to infiltrate networks and compromise data across multiple sectors. D...

Learn More
Dec 25, 2024
Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘Yo...

Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re Fired’ Campaign Phishing remains one of the most prevalent and effective cyber attack methods, thriving on deceptio...

Learn More
Dec 24, 2024
How to Protect Against Digital Risks in Three Steps

How to Protect Against Digital Risks in Three Steps threats to an organization’s digital assets are constantly evolving, cybercriminals are no longer solely focused on breaching your internal network;...

Learn More
Dec 24, 2024
Dark Web Profile: Bashe (APT73)

Dark Web Profile: Bashe (APT73) Bashe, previously known as APT73 or Eraleig, is a ransomware group that emerged in 2024, employing tactics reminiscent of LockBit to target critical industries across d...

Learn More
Dec 24, 2024
Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-5396...

Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-53961), Update Now A critical vulnerability in Adobe ColdFusion versions 2023 and 2021 has prompted urgent security updates. Alarmingl...

Learn More
Dec 23, 2024
Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybers...

Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybersecurity Cyber weapons have emerged as powerful tools for nation-states, fundamentally altering the cybersecurity landscape. These ...

Learn More
Dec 23, 2024
Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out

Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out In today’s fast-paced cybersecurity landscape, Managed Security Service Providers (MSSPs) face mounting pressure to deliver comprehensive ...

Learn More