Blog

Latest articles from SOCRadar

Turla's Reconnaissance Campaign Targets Eastern Europe
May 24, 2022

Turla Reconnaissance Campaign Targets Eastern Europe

The reconnaissance and espionage campaign of the Russia-linked Turla hacker group against the Austrian Economic Chamber, Baltic Defense College, and NATO's Joint Advanced Distributed Learning (JDAL) platform has emerged. Experts think that the recent economic… Continue Reading

Conti Ransomware Ended: They Operate With Other Groups Now
May 20, 2022

Conti Ransomware Ended: They Operate With Other Groups Now

The Conti ransomware gang had taken its infrastructure offline and ceased operations. According to the news of Advanced Intel's Yelisey Boguslavskiy, the Tor admin panel, where Conti held the ransom negotiations and published new data leak… Continue Reading

New Botnet Discovered Exploiting Critical VMware Vulnerability
May 18, 2022

New Botnet Discovered Exploiting Critical VMware Vulnerability

The critical VMware vulnerability with code CVE-2022-22954 was discovered to be used by threat actors for remote code execution in botnet and Log4Shell-driven attacks. Although VMware has announced that the vulnerability has been fixed, cyber-attacks continue… Continue Reading

Critical Vulnerability in Zyxel Firewall and VPN Products Exploited
May 16, 2022

Critical Vulnerability in Zyxel Firewall and VPN Products Exploited

Threat actors exploit the critical vulnerability affecting Zyxel's firewall and VPN devices. The vulnerability allows attackers to inject arbitrary commands without authentication remotely. Zyxel has recently released patches for it. The vulnerability, code CVE-2022-30525, is… Continue Reading

BPFdoor Malware Targets Linux Systems Unnoticed for Five Years
May 13, 2022

BPFdoor Malware Targets Linux Systems Unnoticed for Five Years

It turned out that the backdoor malware called BPFdoor, which cybersecurity researchers recently discovered, has been targeting Linux and Solaris systems for over five years. BPFdoor allows threat actors to remotely connect to a Linux… Continue Reading

10GB Database of Popular VPN Apps Leaked
May 12, 2022

10GB Database of Popular VPN Apps Leaked

Threat actors shared a 10GB database allegedly belonging to popular VPN apps such as SuperVPN, GeckoVPN, and ChatVPN companies in a Telegram group. The database, which includes the personal information of approximately 21 million users,… Continue Reading

Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabilities Fixed
May 11, 2022

Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabilities Fixed

Microsoft has released the May 2022 Patch Tuesday. The patches fix three zero-day vulnerabilities, one of which is actively exploited, and 75 vulnerabilities. According to the released security update, eight vulnerabilities are rated as "critical" and… Continue Reading

Critical Azure Vulnerability Creates a Massive Attack Surface
May 10, 2022

Critical Azure Vulnerability Creates a Massive Attack Surface

Microsoft has released patches for a vulnerability that affects Azure Synapse and Azure Data Factory products, allowing threat actors to RCE the Integration Runtime infrastructure. The vulnerability coded CVE-2022-29972 was evaluated in the high-risk category… Continue Reading

Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Execution
May 5, 2022

Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Execution

A critical vulnerability discovered by F5 on May 4 allows threat actors to bypass iControl REST authentication. The flaw which coded CVE-2022-1388 has a CVSS score of 9.8. According to F5's advisory, there is no… Continue Reading

Why do Companies Need Cybersecurity?
April 27, 2022

Why do Companies Need Cybersecurity?

Cybersecurity encompasses all technologies and techniques that ensure the integrity of computer systems and electronic data. And, at an age where more and more of our business and social lives are conducted online, this is… Continue Reading

Critical Vulnerability in WSO2 Products Could Allow RCE
April 27, 2022

Critical Vulnerability in WSO2 Products Could Allow RCE

It turned out that a critical vulnerability that affects the products of WSO2 and enables RCE has been actively exploited. WSO2 has a wide portfolio of clients worldwide from banking and finance, energy, IT, telecommunications, etc., and… Continue Reading

Cyber Security Awareness Days Worldwide
April 25, 2022

Top 10 Cyber Security Awareness Days Worldwide

Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to toe to protect private life and privacy, company information, and… Continue Reading

T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code
April 25, 2022

T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code

Telecommunications company T-Mobile confirmed that the Lapsus$ extortion group had accessed the company's internal systems and breached its source code a few weeks ago. In a statement on April 22, the company also emphasized that it… Continue Reading

Atlassian Patches Jira Authentication Bypass Vulnerability
April 23, 2022

Atlassian Patches Jira Authentication Bypass Vulnerability

Atlassian has released a security advisory announcing a critical authentication bypass vulnerability in Seraph, the company's web framework, affecting Jira products. The CVSS score of the CVE-2022-0540 vulnerability is 9.9, and it is a very… Continue Reading

Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue
April 15, 2022

Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue

The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity experts. A patch was released on April Patch Tuesday for the vulnerability with CVE-2022-26809 and a CVSS score… Continue Reading

IBM X-Force Threat Intelligence Index 2022
April 13, 2022

IBM X-Force: Now Threat Actors are Faster and Hard to Detect

Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have changed irreversibly. Digitalization, which almost every industry has to adapt to, brought… Continue Reading

Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities
April 13, 2022

Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities

Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities. The security advisory stated that one of the two zero-days is being actively exploited. Zero-day exploited in the… Continue Reading

Is Nginx 0-Day RCE Vulnerability False Alarm?
April 12, 2022

Is Nginx Zero-Day RCE Vulnerability False Alarm?

On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twitter account BlueHornet, which is associated with the group AgainstTheWest. The threat… Continue Reading

Android Banking Malware Octo
April 11, 2022

Android Banking Malware Octo Allows Remote Control on Infected Devices

A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions. It is thought to have been downloaded more than 50,000 times. Expressed as a new version… Continue Reading

Most Remarkable APT Incidents Targeted Malaysia in 2021
April 7, 2022

Most Remarkable APT Incidents That Targeted Malaysia in 2021

Malaysia has rapidly integrated into the digital age with the rest of the world for the past few decades because of the exponential development of ICT infrastructure, and barely any citizen in Malaysia is unconnected… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo