Aug 01, 2024
NIS2 and DORA: What You Need to Know to Stay Compliant and Secure

NIS2 and DORA: What You Need to Know to Stay Compliant and Secure Navigating regulatory compliance can be challenging, particularly for critical sectors in the EU. The NIS2 (Network and Information Se...

Learn More
Aug 01, 2024
Dark Web Profile: Dark Angels

Dark Web Profile: Dark Angels Dark Angels or Dunghill Leak is a sophisticated and highly disruptive ransomware group that has recently gained notoriety. Known for their aggressive tactics and signific...

Learn More
Aug 01, 2024
The Leidos Leak: What to Know, What Are Its Implications?

The Leidos Leak: What to Know, What Are Its Implications? In July, a post on BreachForums brought to light a significant leak involving Leidos Holdings Inc., claiming the exposure of internal files. L...

Learn More
Jul 31, 2024
Why Brand Protection Matters: 5 Cases Every Business Should Know

Why Brand Protection Matters: 5 Cases Every Business Should Know Businesses need to remain cautious in order to protect their assets from the increasing sophistication of hostile actors and the develo...

Learn More
Jul 31, 2024
Top 10 Attack Surface Management Tools

Top 10 Attack Surface Management Tools Attack Surface Management (ASM) tools have become critical for organizations in identifying, managing, and mitigating vulnerabilities in digital environments. Th...

Learn More
Jul 31, 2024
Dark Web Profile: APT40

Dark Web Profile: APT40 APT40, also known as TEMP.Periscope, Leviathan, and many other aliases, is a Chinese cyber-espionage group attributed to the Chinese Ministry of State Security (MSS). Active si...

Learn More
Jul 30, 2024
VMware ESXi Hypervisor Vulnerability (CVE-2024-37085) Exploited by Ran...

VMware ESXi Hypervisor Vulnerability (CVE-2024-37085) Exploited by Ransomware Groups, Microsoft Warns [Update] July 31, 2024: “CISA Adds VMware ESXi Hypervisor Vulnerability (CVE-2024-37085) to ...

Learn More
Jul 30, 2024
ShadowRoot Ransomware Campaign

ShadowRoot Ransomware Campaign The ShadowRoot ransomware campaign represents a significant cybersecurity threat targeting Turkish businesses. This campaign, identified by the X-Labs research team, uti...

Learn More
Jul 29, 2024
Exploit Chain: When One Vulnerability Isn't Enough

Exploit Chain: When One Vulnerability Isn’t Enough A vulnerability is a weakness that cybercriminals can exploit to gain unauthorized access to a computer system. Cybersecurity experts continual...

Learn More
Jul 29, 2024
New on Dark Web: Epic Games Recruitment Post, Poseidon Stealer, Coinba...

New on Dark Web: Epic Games Recruitment Post, Poseidon Stealer, Coinbase Phishing Kit The SOCRadar Dark Web Team has discovered several new cyber threats over the last week. Notable dark web posts inc...

Learn More
Jul 26, 2024
Google’s Solution to Cookie Theft: New Device-Bound Cookies

Google’s Solution to Cookie Theft: New Device-Bound Cookies We seamlessly surf the web, switch between websites, interact with various contents, and session cookies do their work in the background qui...

Learn More
Jul 26, 2024
Dark Web Profile: Eldorado Ransomware

Dark Web Profile: Eldorado Ransomware The Eldorado ransomware group, which reportedly emerged in March, operates a new Ransomware-as-a-Service (RaaS) platform featuring locker variants specifically de...

Learn More
Jul 25, 2024
Major Cyber Attacks Targeting the Finance Industry

Major Cyber Attacks Targeting the Finance Industry The finance industry is an attractive target for cybercriminals due to the large amount of sensitive data and financial assets at stake. Over the pas...

Learn More
Jul 24, 2024
Docker Fixed an AuthZ Bypass Flaw Leading to Privilege Escalation: CVE...

Docker Fixed an AuthZ Bypass Flaw Leading to Privilege Escalation: CVE-2024-41110 On July 23, 2024, Docker issued an advisory regarding a security vulnerability in the authorization plugins (AuthZ), u...

Learn More
Jul 24, 2024
Laravel Framework Affected by a New Critical Vulnerability (CVE-2024-4...

Laravel Framework Affected by a New Critical Vulnerability (CVE-2024-40075): Patch Now A very critical vulnerability, designated as CVE-2024-40075, has emerged in the Laravel PHP framework. This flaw ...

Learn More
Jul 24, 2024
Threat Intelligence Maturity Model (TIMM) - Utilizing TIP (Threat Inte...

Threat Intelligence Maturity Model (TIMM) – Utilizing TIP (Threat Intelligence Provider) Many organizations lack sufficient knowledge about the threats they face and their own security posture as well...

Learn More
Jul 23, 2024
How Custom GPT Models Facilitate Fraud in the Digital Age

How Custom GPT Models Facilitate Fraud in the Digital Age In recent years, the landscape of Artificial Intelligence (AI) has seen remarkable advancements, with GPT (Generative Pre-trained Transformer)...

Learn More
Jul 22, 2024
Alleged Adobe Database Leak, DJI Access Sale, and DDoS Attacks on Poli...

Alleged Adobe Database Leak, DJI Access Sale, and DDoS Attacks on Polish Websites The SOCRadar Dark Web Team discovered several alarming posts on hacker forums and Telegram channels, indicating seriou...

Learn More
Jul 20, 2024
Suspicious Domains Exploiting the Recent CrowdStrike Outage!

Suspicious Domains Exploiting the Recent CrowdStrike Outage! [Update] July 23, 2024: “Researchers Warn of Phishing Scenarios Exploiting the CrowdStrike Outage by Cybercriminals”, “Exploiting Real Time...

Learn More
Jul 19, 2024
CrowdStrike Update Causing Blue Screen of Death and Microsoft 365/Azur...

CrowdStrike Update Causing Blue Screen of Death and Microsoft 365/Azure Outage [Update] August 7, 2024: “New Root Cause Analysis” [Update] July 19, 2024: “Official Statement from the CrowdStrike CEO a...

Learn More