Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers t...
Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers to Remote Code Execution On February 4, 2025, a critical security vulnerability identified as CVE-2025-23114 was disclosed, affecti...
February 2025 Android Updates by Google; Severe Flaws in VMware & ...
February 2025 Android Updates by Google; Severe Flaws in VMware & Microsoft’s Azure AI Recent days have brought a wave of critical security updates from major tech players, addressing vulnerabilit...
CISA Warns of Backdoor in Contec CMS8000 Patient Monitors
CISA Warns of Backdoor in Contec CMS8000 Patient Monitors The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding a backdoor discovered in the Contec CMS80...
Operation Talent: FBI Takes Down Cracked.io and Nulled.to in Global Cy...
Operation Talent: FBI Takes Down Cracked.io and Nulled.to in Global Cybercrime Crackdown In a significant blow to cybercrime, the FBI, in collaboration with international law enforcement agencies, has...
TorNet Backdoor: A Stealthy Cyber Threat Targeting Poland and Beyond
TorNet Backdoor: A Stealthy Cyber Threat Targeting Poland and Beyond Put in peril by financial motives, an actor described as a financial threat actor has been conducting an ongoing malicious campaign...
Is DeepSeek Safe? A Q&A on the Cybersecurity Risks of the AI Platform
Is DeepSeek Safe? A Q&A on the Cybersecurity Risks of the AI Platform [Update] February 4, 2024: “Malicious DeepSeek Packages on PyPI Exposed” DeepSeek, a rising AI platform, has recently made hea...
Operation Digital Eye: Exploiting Visual Studio Code Tunnels for Advan...
Operation Digital Eye: Exploiting Visual Studio Code Tunnels for Advanced Intrusions Operation Digital Eye is a cutting-edge cyber campaign executed by Chinese Advanced Persistent Threat (APT) groups....
The Meeten Campaign: Realst Stealer’s Return Under Guise of Meeting Ap...
The Meeten Campaign: Realst Stealer’s Return Under Guise of Meeting Apps The cybersecurity landscape faces constant evolution, and recent threats highlight the urgency of vigilance. One such sophistic...
Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber ...
Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber Deception Phishing remains one of the most common cyber threats, with attackers constantly refining their methods to exploit human...
A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams
A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams For companies all over the globe, Microsoft Teams is becoming an essential tool for teamwork. Nevertheless, because to its extensive use...
Exploited SonicWall Zero-Day and Multiple QNAP Vulnerabilities Demand ...
Exploited SonicWall Zero-Day and Multiple QNAP Vulnerabilities Demand Immediate Action Significant security vulnerabilities have been discovered, affecting SonicWall and QNAP products. These flaws, in...
Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast...
Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast The cyber world is constantly changing. As technology advances, so do the threats that jeopardize organizations’ security. Decemb...
How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign
How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign Cybersecurity experts are sounding the alarm over a novel spear phishing campaign by the Russian state-sponsored group known as Star Bliz...
FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitat...
FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitation [Update] January 18, 2025: “Fortinet’s Official Statement on the Breach” In a shocking development, the fallout from the...
Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructu...
Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure In recent months, Pumakit, a stealthy Linux rootkit, has emerged as a significant threat, targeting critical infrastructure acr...
January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SA...
January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SAP & Fortinet Updates [Update] January 16, 2025: “Growing Risk from CVE-2024-55591 as FortiGate Exploits Resurface” Microsoft h...
An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerab...
An Overview of the Nominet Security Breach Tied to Ivanti VPN Vulnerability (CVE-2025-0282) [Update] January 17, 2025: “PoC Exploit Released for Ivanti Connect Secure CVE-2025-0282 Vulnerability...
Major Cyber Attacks in Review: December 2024
Major Cyber Attacks in Review: December 2024 December 2024 saw a series of significant cyber attacks that targeted multiple industries, from healthcare to telecommunications. Ransomware groups like Bl...
Ivanti Zero-Day Exploited in Connect Secure, SonicWall SSL VPN and SSH...
Ivanti Zero-Day Exploited in Connect Secure, SonicWall SSL VPN and SSH Vulnerabilities, KerioControl Flaw [Update] January 10, 2024: “Recent Findings Reveal UNC5337 Exploiting Ivanti ICS Vulnera...
Gravy Analytics Breach Puts Millions of Location Records at Risk and H...
Gravy Analytics Breach Puts Millions of Location Records at Risk and Highlights Privacy Threats In an alarming security event, Gravy Analytics, a location data broker, has allegedly fallen victim to a...