Threat Actor Profile: BianLian, The Shape-Shifting Ransomware Group
Threat Actor Profile: BianLian, The Shape-Shifting Ransomware Group Nowadays, there is a rise in the number of ransomware groups with names that mean something. For example, Yanluowang is a deity in C...
Major Cyberattacks in Review: June 2023
Major Cyberattacks in Review: June 2023 In today’s interconnected world, cybersecurity incidents, including the entrance of major cyberattacks in June 2023, have become an unfortunate reality, a...
Fortinet and Linux Kernel Exploit Shares, iCloud Checker Tool, and Cit...
Fortinet and Linux Kernel Exploit Shares, iCloud Checker Tool, and Citrix Access Sales This week, as always, we bring you these startling narratives not to alarm but to inform and prompt action. So jo...
Dark Web Profile: MalasLocker Ransomware
Dark Web Profile: MalasLocker Ransomware A new player has emerged on the stage of cybercrime by announcing multiple victim announcements at the end of April. Dubbed “MalasLocker,” this ransomware oper...
Major Data Leaks on TikTok, Instagram, and Yahoo
Major Data Leaks on TikTok, Instagram, and Yahoo Welcome to this week’s dark web summary from SOCRadar. Our vigilant Dark Web Team has been working around the clock to keep you updated on the latest c...
APT Profile: FIN7
APT Profile: FIN7 In the world of cybercrime, a name resounds with an unsettling echo – FIN7. This notorious cyber gang has left its mark on the globe, causing digital chaos wherever they go. By infil...
RDP Access Sales on Dark Web Forums Detected by SOCRadar
RDP Access Sales on Dark Web Forums Detected by SOCRadar Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection...
APT Profile: Turla
APT Profile: Turla In the digital age, war has transitioned into the virtual world, where many types of cybercriminals, such as hacktivists and nation-state actors, are called Advanced Persistent Thre...
Exploring the Dark Web Job Market
Exploring the Dark Web Job Market The dark web, notorious for its illicit activities, has evolved into a bustling marketplace for various illegal purposes. It serves as a hub for cybercriminals, offer...
The Surge in Cyber Attacks on Latin American Governments
The Surge in Cyber Attacks on Latin American Governments Latin America, a region bustling with potential and promise, has witnessed a worrying trend of escalating cyber threats directed at government ...
Internet-Exposed Devices within Federal Networks
Internet-Exposed Devices within Federal Networks As technology evolves and becomes increasingly integral to all aspects of society, the need for robust cybersecurity measures becomes more pressing. On...
Fake Extortion: How to Tackle and How to Verify?
Fake Extortion: How to Tackle and How to Verify? Today, one of the most critical aspects of maintaining a respectable business is to have resistance against cyber attacks. To that aim, organizations t...
A New RAT Tool, Unauthorized VPN-RDP Access Sale, and New Database Lea...
A New RAT Tool, Unauthorized VPN-RDP Access Sale, and New Database Leaks Brace yourself for this week’s thrilling snapshot of the dark web, where secrets are the common currency, and anonymity r...
Exploring Cyber Threats During the Hajj Season
Exploring Cyber Threats During the Hajj Season “More than 2 million cyber attacks were recorded from all over the world within a month” That is the summary of the cyber struggle during the last Hajj s...
Cyber Shadows Pact: Darknet Parliament (KillNet, Anonymous Sudan, REvi...
Cyber Shadows Pact: Darknet Parliament (KillNet, Anonymous Sudan, REvil) [Update] June 22, 2023: KillNet and Anonymous Sudan targeted the International Finance Corporation. The Darknet Parliament camp...
CL0P's Shell Attack, Stolen Reddit Data, and New Edge Stealer
CL0P’s Shell Attack, Stolen Reddit Data, and New Edge Stealer Brace yourself for this week’s thrilling snapshot of the dark web, where secrets are the common currency, and anonymity reigns...
Enter the BlackLotus: Analysis of the Latest UEFI Bootkit
Enter the BlackLotus: Analysis of the Latest UEFI Bootkit The world of cybercrime is constantly evolving, and one of the latest threats to emerge is the BlackLotus bootkit. This malware is t...
MOVEit Exploit Sales, Doge RAT, and Bandit Stealer Malware
MOVEit Exploit Sales, Doge RAT, and Bandit Stealer Malware As we continue exploring the digital landscape’s obscure corners, the dark web remains an enigmatic yet critical part of the cyberspace...
Major Cyberattacks in Review: May 2023
Major Cyberattacks in Review: May 2023 Throughout May 2023, the cybersecurity landscape witnessed a surge in notable cyberattacks. These incidents encompassed supply chain attacks, data breaches,...
Dark Web Profile: Play Ransomware
Dark Web Profile: Play Ransomware [Update] July 22, 2024: “Play Ransomware Broadens Its Scope with New Linux Variant Targeting ESXi” [Update] December 19, 2023: “Collaborative Advisory on Play Ransomw...