Dark Web Profile: Hunters International
Dark Web Profile: Hunters International Originating in the latter part of 2023, this Ransomware-as-a-Service (RaaS) operation has drawn attention due to its technical lineage and operational tactics r...
Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields ...
Fortifying the Digital Frontier: Australia’s Pioneering Cyber Shields Strategy In 2022, Following the Medibank breach in November, Australia’s Cyber Security Minister Clare O’Neil hi...
Major Cyber Attacks in Review: January 2024
Major Cyber Attacks in Review: January 2024 As January 2024 dawned, the digital atmosphere braced itself for another year’s cybersecurity challenges. Throughout the month, organizations experien...
How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway
How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway Organizations have increasingly moved significant portions of their operations online to streamline customer service processes. Inste...
Cybersecurity Predictions: What Trends Will Be Prevalent in 2024?
Cybersecurity Predictions: What Trends Will Be Prevalent in 2024? The evolving digital environment and expanding attack surface demand vigilant adaptation to stay one step ahead of adversaries. Recogn...
EU & US Credit Cards, 750M Indian Mobile Data at Risk; Subway Hit by L...
EU & US Credit Cards, 750M Indian Mobile Data at Risk; Subway Hit by LockBit The SOCRadar Dark Web Team identified critical incidents in the cyber threat landscape over the last week. These includ...
Okta Customer Support System Breach: Lessons in Supply Chain Risks and...
Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...
LockBit’s New Regulations Sets Minimum For Ransom Demands
LockBit’s New Regulations Sets Minimum For Ransom Demands Recently, the notorious LockBit ransomware group has initiated a significant discussion among its affiliates regarding potential cha...
MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’
MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’ A cybercriminal gang employing a combination of impersonation and malware is the prime suspect behind the cyberattack that crippled the ope...
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild
On the Horizon: Ransomed.vc Ransomware Group Spotted in the Wild [Update] November 9, 2023: “End of an Era, the Sinking of Ransomed.VC” [Update] October 5, 2023: See the subheading: “RansomedVC De-ano...
Dark Web Profile: Big Head Ransomware
Dark Web Profile: Big Head Ransomware While ransomware groups such as ALPHV and Lockbit 3.0 continue to hit big companies and make headlines with the large-sized files they steal, there are also actor...
Major Cyberattacks in Review: July 2023
Major Cyberattacks in Review: July 2023 The major cyberattacks of July 2023 included waves of data breaches, affecting both private and public sector entities, including healthcare organizations, fina...
Critical WooCommerce Vulnerability Enables Admin Privileges on WordPre...
Critical WooCommerce Vulnerability Enables Admin Privileges on WordPress Sites (CVE-2023-28121) Researchers have observed an active exploit campaign targeting a newly disclosed vulnerability, CVE-2023...
Ransomware Attacks on Banking Industry
Ransomware Attacks on Banking Industry Due to the escalating illicit pursuits of cybercriminals seeking unlawful financial gains, particular sectors and specific types of cyber attacks tend to gain pr...
RDP Access Sales on Dark Web Forums Detected by SOCRadar
RDP Access Sales on Dark Web Forums Detected by SOCRadar Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection...
Exploring the Dark Web Job Market
Exploring the Dark Web Job Market The dark web, notorious for its illicit activities, has evolved into a bustling marketplace for various illegal purposes. It serves as a hub for cybercriminals, offer...
Journey into the Top 10 Vulnerabilities Used by Ransomware Groups
Journey into the Top 10 Vulnerabilities Used by Ransomware Groups Once upon a time, in cyberspace, a menacing threat emerged. It would forever change the landscape of digital security. This threat was...
Cyclops Ransomware: Cross-Platform Threat with RaaS and Advanced Featu...
Cyclops Ransomware: Cross-Platform Threat with RaaS and Advanced Features [Update] August 7, 2023: After officially rebranding as Knight, Cyclops has shared their new stealer named “Knight steal...
Dark Web Profile: Play Ransomware
Dark Web Profile: Play Ransomware [Update] December 19, 2023: Read under title: “Collaborative Advisory on Play Ransomware: 300 Entities Affected by October 2023.” [Update] November 22, 2023: Read und...
Mutation Effect of Babuk Code Leakage: New Ransomware Variants
Mutation Effect of Babuk Code Leakage: New Ransomware Variants Ransomware continues to be a significant concern for individuals and organizations alike. One particular ransomware group, Babuk, made&nb...