
International Operation Targets 8Base and Phobos Ransomware Gangs
International Operation Targets 8Base and Phobos Ransomware Gangs In a coordinated global effort, law enforcement agencies have successfully dismantled the dark web infrastructure of the 8Base ransomw...

Major Cyber Attacks in Review: January 2025
Major Cyber Attacks in Review: January 2025 In January 2025, high-profile cyber incidents affecting industries ranging from healthcare and telecommunications to AI and finance made headlines. From the...

Critical Cisco ISE Vulnerabilities Patched: CVE-2025-20124 & CVE-2025-...
Critical Cisco ISE Vulnerabilities Patched: CVE-2025-20124 & CVE-2025-20125 Cisco has issued a security advisory regarding two critical vulnerabilities in its Identity Services Engine (ISE), CVE-2...

CISA Adds Apache OFBiz, Microsoft .NET, and Paessler PRTG Vulnerabilit...
CISA Adds Apache OFBiz, Microsoft .NET, and Paessler PRTG Vulnerabilities to the KEV Catalog The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulner...

Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers t...
Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers to Remote Code Execution On February 4, 2025, a critical security vulnerability identified as CVE-2025-23114 was disclosed, affecti...

February 2025 Android Updates by Google; Severe Flaws in VMware & ...
February 2025 Android Updates by Google; Severe Flaws in VMware & Microsoft’s Azure AI Recent days have brought a wave of critical security updates from major tech players, addressing vulnerabilit...

CISA Warns of Backdoor in Contec CMS8000 Patient Monitors
CISA Warns of Backdoor in Contec CMS8000 Patient Monitors The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory regarding a backdoor discovered in the Contec CMS80...

Operation Talent: FBI Takes Down Cracked.io and Nulled.to in Global Cy...
Operation Talent: FBI Takes Down Cracked.io and Nulled.to in Global Cybercrime Crackdown In a significant blow to cybercrime, the FBI, in collaboration with international law enforcement agencies, has...

TorNet Backdoor: A Stealthy Cyber Threat Targeting Poland and Beyond
TorNet Backdoor: A Stealthy Cyber Threat Targeting Poland and Beyond Put in peril by financial motives, an actor described as a financial threat actor has been conducting an ongoing malicious campaign...

Is DeepSeek Safe? A Q&A on the Cybersecurity Risks of the AI Platform
Is DeepSeek Safe? A Q&A on the Cybersecurity Risks of the AI Platform [Update] March 3, 2025: “DeepSeek’s Training Data Exposed Nearly 12,000 Live API Keys” [Update] February 4, 2025: “Malicious ...

Operation Digital Eye: Exploiting Visual Studio Code Tunnels for Advan...
Operation Digital Eye: Exploiting Visual Studio Code Tunnels for Advanced Intrusions Operation Digital Eye is a cutting-edge cyber campaign executed by Chinese Advanced Persistent Threat (APT) groups....

The Meeten Campaign: Realst Stealer’s Return Under Guise of Meeting Ap...
The Meeten Campaign: Realst Stealer’s Return Under Guise of Meeting Apps The cybersecurity landscape faces constant evolution, and recent threats highlight the urgency of vigilance. One such sophistic...

Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber ...
Top 10 Phishing Attacks of 2024: Lessons Learned from a Year of Cyber Deception Phishing remains one of the most common cyber threats, with attackers constantly refining their methods to exploit human...

A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams
A New Wave Of Ransomware Campaigns Is Targeting Microsoft Teams For companies all over the globe, Microsoft Teams is becoming an essential tool for teamwork. Nevertheless, because to its extensive use...

Exploited SonicWall Zero-Day and Multiple QNAP Vulnerabilities Demand ...
Exploited SonicWall Zero-Day and Multiple QNAP Vulnerabilities Demand Immediate Action Significant security vulnerabilities have been discovered, affecting SonicWall and QNAP products. These flaws, in...

Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast...
Unlock Threat Intelligence Insights with SOCRadar’s AI-Powered Podcast The cyber world is constantly changing. As technology advances, so do the threats that jeopardize organizations’ security. Decemb...

How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign
How Star Blizzard Exploits WhatsApp in Spear Phishing Campaign Cybersecurity experts are sounding the alarm over a novel spear phishing campaign by the Russian state-sponsored group known as Star Bliz...

FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitat...
FortiGate Firewall Configs Dumped: Revisiting CVE-2022-40684 Exploitation [Update] January 18, 2025: “Fortinet’s Official Statement on the Breach” In a shocking development, the fallout from the...

Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructu...
Pumakit: A Sophisticated Linux Rootkit Targeting Critical Infrastructure In recent months, Pumakit, a stealthy Linux rootkit, has emerged as a significant threat, targeting critical infrastructure acr...

January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SA...
January 2025 Patch Tuesday Highlights: 8 Zero-Days, 159 CVEs Fixed; SAP & Fortinet Updates [Update] January 16, 2025: “Growing Risk from CVE-2024-55591 as FortiGate Exploits Resurface” Microsoft h...