Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharge...
Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharge Pentesting & Red Teaming In 2024, cybersecurity threats surged to unprecedented levels, with the average cost of a data...
View ArticleMozilla Responds to Critical Vulnerability: Urgent Firefox Update
Mozilla Responds to Critical Vulnerability: Urgent Firefox Update In a rapid response to a similar vulnerability with Google Chrome, Mozilla has issued an update for its Firefox browser on Windows to...
View ArticleMajor Cyber Attacks Targeting Transportation & Logistics Industry
Major Cyber Attacks Targeting Transportation & Logistics Industry The global transportation and logistics industry is the backbone of modern commerce, enabling the smooth flow of goods and services...
View ArticleAlleged Check Point Breach: What Happened and What You Need to Know?
Alleged Check Point Breach: What Happened and What You Need to Know? [Update] April 2, 2025: “Latest Developments: Dissecting CoreInjection’s Claims and the Alleged Leak” On March 31, 2025, a threat...
View ArticleCyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany
Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany This week, SOCRadar’s Dark Web Team uncovered several notable cyber threats circulating on hacker forums. Among the key findings are an...
View ArticleCrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): What You...
CrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): What You Need to Know A newly discovered flaw in the CrushFTP file transfer platform is under active exploitation, with threat actors...
View ArticleTop 10 Dark Web Monitoring Tools
Top 10 Dark Web Monitoring Tools Imagine a place on the internet where rules don’t exist, identities are masked, and secrets are currency. Welcome to the dark web—a digital underworld where...
View ArticleThe Blogpost Based Phishing Attacks
The Blogpost Based Phishing Attacks Recently, the increase in Blogspot-based phishing sites has drawn attention. Threat actors are taking advantage of Blogspot’s free and seemingly reliable...
View ArticleEverything You Need to Know About the Alleged Twilio SendGrid Breach
Everything You Need to Know About the Alleged Twilio SendGrid Breach On April 3, 2025, a threat actor operating under the alias Satanic announced on BreachForums that they were in possession of a...
View ArticleUNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE &...
UNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE & BRUSHFIRE Malware A recently disclosed critical vulnerability in Ivanti products, CVE-2025-22457, has drawn urgent attention...
View Article