
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025 In 2023, we compiled a list of the top free Cyber Threat Intelligence (CTI) sources to help security teams stay ahead of evolving t...

Black Basta’s Internal Chats Leak: Everything You Need to Know
Black Basta’s Internal Chats Leak: Everything You Need to Know (21.02.2025) Update: List of Domains in Leaked Chats (21.02.2025) Update: SOCRadar’s Intelligence Findings of Black Basta Leak, IoCs, TTP...

Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-O...
Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw (CVE-2025-0111) Joins CISA KEV Two major security flaws pose a serious exploitation risk for organizations using Micros...

Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CV...
Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global Attacks An ongoing cyber campaign targets unpatched Cisco IOS XE software used in telecommunications n...

Best Secure Browsers for 2025: A Comparison Guide
Best Secure Browsers for 2025: A Comparison Guide Your browser is your ship on the vast internet sea. It determines your safety first, followed by your speed and path. Choosing a secure browser is not...

Security Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025...
Security Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025-26465, CVE-2025-26466, and CVE-2025-21589) Recent discoveries have revealed severe vulnerabilities in two widely used networking ...

Protect Your Social Media Data from AI Training: Opt-Out Options & Pri...
Protect Your Social Media Data from AI Training: Opt-Out Options & Privacy Tips In today’s digital-first world, social media is central to our daily lives. But did you know AI systems can train on...

A New Wave of Ransomware Campaigns Targeting Microsoft Teams
A New Wave of Ransomware Campaigns Targeting Microsoft Teams For companies all over the globe, Microsoft Teams is becoming an essential tool for teamwork. Nevertheless, because of its extensive use, i...

Alarming Dark Web Leak: B1ack's Stash Releases 4 Million Stolen Credit...
Alarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards for Free The Dark Web marketplace B1ack’s Stash has stirred concerns by leaking 4 million stolen credit card de...

EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ...
EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs In recent years, the cybersecurity landscape has witnessed a surge in sophisticated and highly targeted cyberattacks, with th...

Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban S...
Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban Service Found SOCRadar’s Dark Web Team has uncovered several alarming cyber threats circulating on hacker forums this week. Key dis...

Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024
Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024 Advanced Persistent Threats (APTs) are among the most sophisticated and persistent cyber adversaries in the world. Unlike ordinary cy...

Palo Alto Firewall Vulnerability (CVE-2025-0108) Under Attack – Are Yo...
Palo Alto Firewall Vulnerability (CVE-2025-0108) Under Attack – Are You at Risk? [Update] February 19, 2025: “Escalating Exploitation of CVE-2025-0108” Palo Alto Networks has addressed a n...

Dark Web Profile: Fog Ransomware
Dark Web Profile: Fog Ransomware Fog Ransomware emerged in April 2024, was first detected in the wild in early May, primarily targeting US based educational institutions targeting both Windows and Lin...

Ivanti Security Update Addresses Severe Vulnerabilities in ICS, IPS, a...
Ivanti Security Update Addresses Severe Vulnerabilities in ICS, IPS, and ISAC (CVE-2025-22467, CVE-2024-38657, CVE-2024-10644) In response to newly identified vulnerabilities, Ivanti has released secu...

Lazarus Group’s Latest Cyber Espionage Tactics Involving LinkedIn
Lazarus Group’s Latest Cyber Espionage Tactics Involving LinkedIn The Lazarus Group, a North Korean government-backed hacking team, has increased its spying efforts by taking advantage of work network...

February 2025 Patch Tuesday: Microsoft Fixes 63 Vulnerabilities, Inclu...
February 2025 Patch Tuesday: Microsoft Fixes 63 Vulnerabilities, Including Two Actively Exploited Zero-Days Microsoft’s latest Patch Tuesday update for February 2025 delivers important security ...

International Operation Targets 8Base and Phobos Ransomware Gangs
International Operation Targets 8Base and Phobos Ransomware Gangs In a coordinated global effort, law enforcement agencies have successfully dismantled the dark web infrastructure of the 8Base ransomw...

Key Insights from the 2024 End-of-Year Report: Preparing for Cyber Thr...
Key Insights from the 2024 End-of-Year Report: Preparing for Cyber Threats in 2025 The cyber threat landscape in 2024 witnessed an unprecedented surge in sophisticated attacks, with cybercriminals lev...

Major Cyber Attacks in Review: January 2025
Major Cyber Attacks in Review: January 2025 In January 2025, high-profile cyber incidents affecting industries ranging from healthcare and telecommunications to AI and finance made headlines. From the...