Nov 22, 2024
Dark Web Profile: Moonstone Sleet

Dark Web Profile: Moonstone Sleet Moonstone Sleet AKA Storm-1789, a newly identified North Korean Advanced Persistent Threat (APT) group, has been making waves with its targeted cyberattacks that blen...

Learn More
Nov 22, 2024
NodeStealer’s Evolution: A Growing Threat to Facebook Accounts and Bey...

NodeStealer’s Evolution: A Growing Threat to Facebook Accounts and Beyond NodeStealer, a Python-based infostealer, has resurfaced in a more dangerous form, raising the stakes for global cybersecurity ...

Learn More
Nov 21, 2024
Financial Software Company Finastra Investigates Recent Security Incid...

Financial Software Company Finastra Investigates Recent Security Incident Finastra, a prominent financial services software provider, is currently investigating a cybersecurity incident that has raise...

Learn More
Nov 21, 2024
Hackers Don't Hack, They Log In – Stealer Logs and Identity Attacks

Hackers Don’t Hack, They Log In – Stealer Logs and Identity Attacks Cyber threat actors are moving beyond traditional methods like exploiting vulnerabilities or brute-forcing passwords. Instead, they ...

Learn More
Nov 21, 2024
Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Sys...

Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws Recent findings have exposed high-severity flaws in the needrestart utility, a key component ...

Learn More
Nov 20, 2024
Apple, Oracle, and Apache Issue Critical Updates for Actively Exploite...

Apple, Oracle, and Apache Issue Critical Updates for Actively Exploited and High-Risk Vulnerabilities Organizations using Apple, Oracle, and Apache software must act quickly as critical security flaws...

Learn More
Nov 20, 2024
Top 10 Metrics Every CISO Should Track for Better Security

Top 10 Metrics Every CISO Should Track for Better Security Chief Information Security Officers (CISOs) must navigate a wide range of threats and vulnerabilities in order to effectively protect their o...

Learn More
Nov 19, 2024
Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0...

Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0012 and CVE-2024-9474) [Update] November 22, 2024: “Growing Exploitation of Palo Alto Networks PAN-OS Vulnerabilities”  Palo Alto ...

Learn More
Nov 19, 2024
How Stealer Logs Target E-Commerce Giants During Black Friday

How Stealer Logs Target E-Commerce Giants During Black Friday As the holiday season approaches, Black Friday stands out as one of the busiest shopping days of the year. For consumers, it’s an opportun...

Learn More
Nov 18, 2024
Asia Hacktivist Threat Landscape

Asia Hacktivist Threat Landscape Hacktivism blurs the lines between digital rebellion and activism, as threat actors act for their social and political causes. Far from the traditional protest, hackti...

Learn More
Nov 18, 2024
Ford Customer Data Breach, German Statistical Data Leak, and Bank of F...

Ford Customer Data Breach, German Statistical Data Leak, and Bank of France Targeted Recently, SOCRadar’s Dark Web Team has identified an alleged data breach at Ford Motor Company that exposed 44,000 ...

Learn More
Nov 15, 2024
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insi...

Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights Today, when the world is increasingly moving towards digital operation, stolen data circulating on the Dark Web has been a ni...

Learn More
Nov 15, 2024
Dark Web Profile: Cadet Blizzard

Dark Web Profile: Cadet Blizzard Cadet Blizzard (DEV-0586) is a Russian GRU-affiliated cyber threat group first tracked by Microsoft in early 2022, following a series of disruptive cyberattacks on Ukr...

Learn More
Nov 14, 2024
Google’s Cybersecurity Forecast 2025 (Key Insights and Trends for the ...

Google’s Cybersecurity Forecast 2025 (Key Insights and Trends for the Year Ahead) As 2024 draws to a close, Google Cloud Security’s Cybersecurity Forecast 2025 offers a grounded outlook on the cyberse...

Learn More
Nov 14, 2024
What is Adversarial Threat Emulation and Validation?

What is Adversarial Threat Emulation and Validation? How prepared is your organization to face the same tactics used by the most advanced cyber attackers? Adversarial threat emulation answers this que...

Learn More
Nov 13, 2024
Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed,...

Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed, Two Active Zero-Day Exploits Microsoft has released its latest security updates with November 2024 Patch Tuesday, addressing a br...

Learn More
Nov 13, 2024
Major Cyber Attacks in Review: October 2024 

Major Cyber Attacks in Review: October 2024 October 2024 brought a wave of high-profile cyber incidents across various sectors, highlighting the ongoing challenges in digital security. Financial insti...

Learn More
Nov 13, 2024
Critical RCE in Ivanti Endpoint Manager, Citrix Virtual Apps & Desktop...

Critical RCE in Ivanti Endpoint Manager, Citrix Virtual Apps & Desktops Flaws – Patch Now [Update] November 19, 2024: “Exploitation of CVE-2024-8068 and CVE-2024-8069 Confirmed” Two re...

Learn More
Nov 12, 2024
Identity is the New Perimeter: An Infostealer Perspective

Identity is the New Perimeter: An Infostealer Perspective As organizations navigate an increasingly complex IT landscape, traditional security boundaries continue to dissolve. The modern environment i...

Learn More
Nov 12, 2024
Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Rec...

Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records Data breaches have become increasingly common, affecting millions of users across various sectors. One of the latest high-pro...

Learn More