Latest articles from SOCRadar
In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Information Security Officers (CISOs). Dark Web is a mysterious and often misunderstood part of the internet… Continue Reading
In today's interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a popular messaging platform known for its security features, has not remained untouched by those with malicious intent. Recently,… Continue Reading
In the ever-evolving landscape of cyber threats, understanding the profiles of individual threat actors is crucial for both governments and private organizations to take action before major incidents happen. One such actor that has recently… Continue Reading
Among the ever-evolving threats in the world of cybersecurity, SMS Bomber attacks are emerging as a modern danger that can have significant and disturbing consequences. Recently, almost all of us have received SMS or calls… Continue Reading
Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In this blog post, we delve into Dark Web search engines. Hidden from the prying eyes of mainstream search giants, these enigmatic… Continue Reading
The SOCRadar Dark Web Team continuously uncovers incidents that endanger various entities by monitoring the hidden recesses of the internet. In this blog post, we explore five recent findings: A sale for blackhat tool Evil-GPT… Continue Reading
While ransomware groups such as ALPHV and Lockbit 3.0 continue to hit big companies and make headlines with the large-sized files they steal, there are also actors who do not even have a TOR page… Continue Reading
The SOCRadar Dark Web Team has been tirelessly monitoring the deep corners of the internet, and their efforts have unearthed several incidents that put various entities at risk. In this blog post, we will explore… Continue Reading
[Update] November 16, 2023: See the subheading: “Collaborative Advisory by CISA, FBI, and MS-ISAC on Rhysida Ransomware.” The digital world is an ever-evolving landscape, and with it comes the evolution of cyber threats. One such… Continue Reading
The major cyberattacks of July 2023 included waves of data breaches, affecting both private and public sector entities, including healthcare organizations, financial institutions, and government agencies. However, the most attention-grabbing incident of the month was… Continue Reading
In cyberspace, few threats rival ransomware attacks' pervasive and destructive nature. As our interconnected world grows, these digital extortionists demonstrate unparalleled audacity. Their actions span from crippling multinational corporations to disrupting critical infrastructure and compromising… Continue Reading
Welcome to the twisted world of the Dark Web, where the illicit trade of cyber weapons and stolen data thrives under the cover of anonymity. In this blog post, we will explore some of the… Continue Reading
In today's cyber world, while the ransomware scene remains dynamic and active, new actors are emerging with significant numbers of victims. In this article, we will focus on 8Base Ransomware, which ranked in the top… Continue Reading
The threat group, Gamaredon, linked to Russia, has been observed engaging in data exfiltration activities shortly after gaining initial access to targeted systems. The Computer Emergency Response Team of Ukraine (CERT-UA) recently released an analysis… Continue Reading
In cyberspace, the Korean Peninsula has been a hotbed of activity for a while. With conflict unfolding between North and South Korea, North Korean Advanced Persistent Threats (APTs) are emerging as the weapon of choice.… Continue Reading
Welcome to SOCRadar's weekly dark web news digest. This week, we spotlight several critical cybersecurity incidents: a significant user data leak from Roblox, unauthorized access sale related to global BPO, Webhelp, and the data breach… Continue Reading
[Update] August 7, 2023: Clop ransomware has now adopted Torrents as a distribution method for the stolen data. See more under: “Clop Adopts New Extortion Approach: Leaking Data via Torrents.” [Update] July 28, 2023: See… Continue Reading
Following an Islamophobic incident where the Qur'an was burned in Stockholm, Sweden, a new wave of cyber attacks, named #OpSweden, has emerged with significant distinctions from previous occurrences.The incident originated on June 28 when Swedish… Continue Reading
The rapidly evolving threats in the field of cybersecurity are being met with sophisticated methods such as "FUD" (Fully UnDetectable) crypters, which are advanced crypter tools used by cybercriminals. This sophisticated software renders malicious code… Continue Reading
As the effectiveness of ransomware attacks continues to escalate, they have emerged as the most significant challenge in today's digital landscape. Despite ongoing efforts by the Cyber Security community to combat these malicious activities, threat… Continue Reading