Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misad...
Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures If the events from dark web this series were a script, it would be the kind of thriller where everyone fumbles their part...
Chrome/Edge Exploit, Aliena Botnet, and Massive Data Breaches Uncovere...
Chrome/Edge Exploit, Aliena Botnet, and Massive Data Breaches Uncovered Hacker forums monitored by SOCRadar’s Dark Web Team have revealed several alarming cyber threats this week, including the sale o...
Is Your Personal Data for Sale on the Dark Web? Risks and Protection S...
Is Your Personal Data for Sale on the Dark Web? Risks and Protection Strategies The Dark Web has grown into a bustling market for stolen personal data, where cybercriminals trade sensitive information...
Major Cyber Attacks Targeting the Telecommunication Industry (2023 - 2...
Major Cyber Attacks Targeting the Telecommunication Industry (2023 – 2024) The telecommunication industry plays a vital role in connecting the world, supporting everything from personal communications...
CISO's Guide to Navigating Dark Web Risks – How to Protect Your Organi...
CISO’s Guide to Navigating Dark Web Risks – How to Protect Your Organization As cyber threats grow increasingly sophisticated, Chief Information Security Officers (CISOs) are tasked with defendi...
Dark Web Profile: Salt Typhoon
Dark Web Profile: Salt Typhoon Salt Typhoon, a Chinese state-sponsored Advanced Persistent Threat (APT), has been a formidable force in cyber espionage since its emergence in 2020. Known by various na...
Termite Ransomware Attack on Blue Yonder: What You Need to Know
Termite Ransomware Attack on Blue Yonder: What You Need to Know In late November 2024, Blue Yonder, a critical provider of supply chain management solutions, fell victim to a ransomware attack attribu...
Dark Web Profile: Ymir Ransomware
Dark Web Profile: Ymir Ransomware The emergence of Ymir ransomware adds a new layer to the cybersecurity landscape, featuring advanced tactics that challenge traditional security defenses. Originating...
Renault India Breach, 147M Stealer Logs, Cardinal Health Leak, Univers...
Renault India Breach, 147M Stealer Logs, Cardinal Health Leak, University ESXi & Saudi Company Access Sales In the last week, SOCRadar’s Dark Web Team has identified multiple critical cyber threat...
Dark Web Alerts: Xeno RAT, OneCard Data, and Israeli Credit Cards
Dark Web Alerts: Xeno RAT, OneCard Data, and Israeli Credit Cards Recent findings by SOCRadar’s Dark Web Team reveal a surge in cyber threats in hacker forums, including the release of Xeno RAT, a pow...
Dark Web Market: Abacus Market
Dark Web Market: Abacus Market Abacus Market has emerged as a prominent player in the dark web ecosystem, offering a platform for illicit goods and services. Launched in September 2021 as a response t...
The Dark Web and Cybercrime: How Hidden Networks Operate
The Dark Web and Cybercrime: How Hidden Networks Operate The Dark Web represents the concealed segment of networks where anonymity reigns supreme. While not inherently illegal, its infrastructure has ...
How to Overcome Dark Web Risks in Your Industry - CISO Edition
How to Overcome Dark Web Risks in Your Industry – CISO Edition The dark web has evolved into a vast and thriving marketplace for stolen data, illicit services, and cybercrime tools. For Chief Informat...
Tesla Charging Stations, Banque de France, and NOQ Group Targeted on D...
Tesla Charging Stations, Banque de France, and NOQ Group Targeted on Dark Web SOCRadar’s Dark Web Team has highlighted a range of concerning cyber threats since last week. Among these are the launch o...
Dark Web Profile: Moonstone Sleet
Dark Web Profile: Moonstone Sleet Moonstone Sleet AKA Storm-1789, a newly identified North Korean Advanced Persistent Threat (APT) group, has been making waves with its targeted cyberattacks that blen...
Financial Software Company Finastra Investigates Recent Security Incid...
Financial Software Company Finastra Investigates Recent Security Incident Finastra, a prominent financial services software provider, is currently investigating a cybersecurity incident that has raise...
Hackers Don't Hack, They Log In – Stealer Logs and Identity Attacks
Hackers Don’t Hack, They Log In – Stealer Logs and Identity Attacks Cyber threat actors are moving beyond traditional methods like exploiting vulnerabilities or brute-forcing passwords. Instead, they ...
Asia Hacktivist Threat Landscape
Asia Hacktivist Threat Landscape Hacktivism blurs the lines between digital rebellion and activism, as threat actors act for their social and political causes. Far from the traditional protest, hackti...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of F...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of France Targeted Recently, SOCRadar’s Dark Web Team has identified an alleged data breach at Ford Motor Company that exposed 44,000 ...
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insi...
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights Today, when the world is increasingly moving towards digital operation, stolen data circulating on the Dark Web has been a ni...