
Phishing Links in Browsers: Identifying Red Flags and Staying Safe
Phishing Links in Browsers: Identifying Red Flags and Staying Safe According to the FBI’s Internet Crime Report, phishing scams resulted in over $52 billion in losses in 2023 alone, demonstrating how ...

How to Secure Your Mobile Banking App Against Keyloggers
How to Secure Your Mobile Banking App Against Keyloggers Mobile banking has become an essential part of daily life, offering convenience at our fingertips. With just a few taps, we can check balances,...

The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for ...
The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations Artificial intelligence (AI) has long been heralded as a force for innovation, revolutionizing industries and red...

23 Billion Rows of Stolen Records: What You Need to Know?
23 Billion Rows of Stolen Records: What You Need to Know? Update: What Does the Alleged Leak Data Contain? Infostealer malware continues to pose a severe threat, with billions of stolen records circul...

Master Cybersecurity with Agentic AI: Exclusive Training on February 2...
Master Cybersecurity with Agentic AI: Exclusive Training on February 27, 2025! Cyber threats are advancing at an unprecedented pace, outpacing traditional security measures and demanding innovative so...

The Top 10 Dark Web Telegram Chat Groups and Channels
The Top 10 Dark Web Telegram Chat Groups and Channels Since the WhatsApp privacy policy controversy in January 2021, Telegram rapidly gained traction as a privacy-focused alternative, attracting users...

Security Alert: Critical Flaws in MITRE Caldera and Parallels Desktop ...
Security Alert: Critical Flaws in MITRE Caldera and Parallels Desktop (CVE-2025-27364, CVE-2024-34331) Two critical vulnerabilities, CVE-2025-27364 in MITRE Caldera and CVE-2024-34331 in Parallels Des...

Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, ...
Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, New Data Leak Claims Cybercriminal activity continues to escalate on hacker forums, with SOCRadar’s Dark Web Team identifying seve...

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025 In 2023, we compiled a list of the top free Cyber Threat Intelligence (CTI) sources to help security teams stay ahead of evolving t...

Black Basta’s Internal Chats Leak: Everything You Need to Know
Black Basta’s Internal Chats Leak: Everything You Need to Know (21.02.2025) Update: List of Domains in Leaked Chats (21.02.2025) Update: SOCRadar’s Intelligence Findings of Black Basta Leak, IoCs, TTP...

Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-O...
Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw (CVE-2025-0111) Joins CISA KEV Two major security flaws pose a serious exploitation risk for organizations using Micros...

Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CV...
Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global Attacks An ongoing cyber campaign targets unpatched Cisco IOS XE software used in telecommunications n...

Best Secure Browsers for 2025: A Comparison Guide
Best Secure Browsers for 2025: A Comparison Guide Your browser is your ship on the vast internet sea. It determines your safety first, followed by your speed and path. Choosing a secure browser is not...

Security Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025...
Security Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025-26465, CVE-2025-26466, and CVE-2025-21589) Recent discoveries have revealed severe vulnerabilities in two widely used networking ...

Protect Your Social Media Data from AI Training: Opt-Out Options & Pri...
Protect Your Social Media Data from AI Training: Opt-Out Options & Privacy Tips In today’s digital-first world, social media is central to our daily lives. But did you know AI systems can train on...

A New Wave of Ransomware Campaigns Targeting Microsoft Teams
A New Wave of Ransomware Campaigns Targeting Microsoft Teams For companies all over the globe, Microsoft Teams is becoming an essential tool for teamwork. Nevertheless, because of its extensive use, i...

Alarming Dark Web Leak: B1ack's Stash Releases 4 Million Stolen Credit...
Alarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards for Free The Dark Web marketplace B1ack’s Stash has stirred concerns by leaking 4 million stolen credit card de...

EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ...
EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs In recent years, the cybersecurity landscape has witnessed a surge in sophisticated and highly targeted cyberattacks, with th...

Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban S...
Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban Service Found SOCRadar’s Dark Web Team has uncovered several alarming cyber threats circulating on hacker forums this week. Key dis...

Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024
Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024 Advanced Persistent Threats (APTs) are among the most sophisticated and persistent cyber adversaries in the world. Unlike ordinary cy...