Quantcast
Channel: SOCRadar® Cyber Intelligence Inc.
Browsing all 524 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Major Cyber Attacks in Review: March 2024

Major Cyber Attacks in Review: March 2024 March 2024 witnessed a wave of cyber attacks targeting prominent organizations globally. From telecommunications giants to government pension funds, several...

View Article


Image may be NSFW.
Clik here to view.

Dark Web Monitoring with Open-Source Tools and Services

Dark Web Monitoring with Open-Source Tools and Services The dark web, intentionally hidden on the internet, is accessible only through specialized browsers or technologies. Defenders monitor it for...

View Article


Image may be NSFW.
Clik here to view.

Ivanti Avalanche Received an Update for Over Two Dozen Vulnerabilities...

Ivanti Avalanche Received an Update for Over Two Dozen Vulnerabilities (CVE-2024-24996, CVE-2024-29204…) Ivanti has recently issued security updates to address multiple vulnerabilities in Avalanche....

View Article

Image may be NSFW.
Clik here to view.

Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in Open...

Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in Open Source Security Recent events have brought to light critical issues related to cybersecurity threats and social engineering...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-21006 in Oracle WebLogic Server – Oracle’s April 2024 Update Brings...

CVE-2024-21006 in Oracle WebLogic Server – Oracle’s April 2024 Update Brings 441 New Security Patches Oracle has released its Critical Patch Update advisory for April 2024, which addresses...

View Article


Image may be NSFW.
Clik here to view.

Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations

Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations We are all aware that reactive measures are insufficient in this age of cyber threats; businesses must take proactive steps to...

View Article

Image may be NSFW.
Clik here to view.

OpenMetadata Vulnerabilities Allow Attackers to Cryptomine in Kubernetes...

OpenMetadata Vulnerabilities Allow Attackers to Cryptomine in Kubernetes Environments Recent findings from a Microsoft security blog reveal that attackers exploit newly discovered critical...

View Article

Image may be NSFW.
Clik here to view.

Rise of Malicious AI Tools: A Case Study with HackerGPT

Rise of Malicious AI Tools: A Case Study with HackerGPT Artificial intelligence, particularly generative models, has become increasingly prevalent over the past few years. Its impact on the workforce...

View Article


Image may be NSFW.
Clik here to view.

In the Crosshairs: Top 10 Threat Actors Targeting the USA

In the Crosshairs: Top 10 Threat Actors Targeting the USA As the digital landscape continues to evolve, the United States finds itself at the forefront of emerging cybersecurity challenges. With its...

View Article


Image may be NSFW.
Clik here to view.

Dark Web Profile: Akira Ransomware

Dark Web Profile: Akira Ransomware Since its discovery in early 2023, Akira ransomware has evolved from a seemingly ordinary addition to the ransomware landscape to a significant threat affecting a...

View Article

Image may be NSFW.
Clik here to view.

Biggest Cybersecurity Risks SMEs Face and CTI as a Solution

Biggest Cybersecurity Risks SMEs Face and CTI as a Solution Small and Medium Enterprises (SMEs) can be considered the engine of their country’s economies. Their efforts result in economic growth. The...

View Article

Image may be NSFW.
Clik here to view.

Dark Peep #13: Money Laundering 1M1

Dark Peep #13: Money Laundering 1M1 Welcome to Dark Peep #13: Money Laundering 1M1, where the cyber landscape mirrors the shifting sands of the dark web, guided by the astute observations of SOCRadar...

View Article

Image may be NSFW.
Clik here to view.

Password Dictionary Analysis: Ultimate Wordlist of USA Passwords

Password Dictionary Analysis: Ultimate Wordlist of USA Passwords In the digital age, where our lives are increasingly connected with technology, the importance of securing our online accounts cannot be...

View Article


Image may be NSFW.
Clik here to view.

Deciphering Cyber Shadows: Insights into China and Russia’s Cybercrime...

Deciphering Cyber Shadows: Insights into China and Russia’s Cybercrime Ecosystems In an era where cyber threats loom large over global security, understanding the operational dynamics within notorious...

View Article

Image may be NSFW.
Clik here to view.

Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone...

Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users The SOCRadar Dark Web Team recently discovered a leaked database containing sensitive customer information from Honda...

View Article


Image may be NSFW.
Clik here to view.

APT28 Deploys ‘GooseEgg’ in Attacks Exploiting the Windows Print Spooler...

APT28 Deploys ‘GooseEgg’ in Attacks Exploiting the Windows Print Spooler Vulnerability, CVE-2022-38028 Microsoft recently shed light on a campaign orchestrated by the Russian-based threat actor Forest...

View Article

Image may be NSFW.
Clik here to view.

Beyond Phishing: Top 10 Data Breach Sets

Beyond Phishing: Top 10 Data Breach Sets In recent years, there has been a significant increase in the amount of sensitive data available, making cybercrime more of a risk even for people who aren’t...

View Article


Image may be NSFW.
Clik here to view.

Dark Web Profile: Red Ransomware

Dark Web Profile: Red Ransomware On April 3, 2024, a newly discovered ransomware group surfaced as Senior Threat Analyst Rakesh Krishnan shed light. Known as Red CryptoApp, this group began its...

View Article

Image may be NSFW.
Clik here to view.

Could Your Email be Hacked? 2024 Analysis of Top Email Providers in Stealer Logs

Could Your Email be Hacked? 2024 Analysis of Top Email Providers in Stealer Logs With the ever-present concern surrounding the security of email addresses and the accounts linked to them, there arises...

View Article

Image may be NSFW.
Clik here to view.

Threat Actor Profile: Molerats

Threat Actor Profile: Molerats Much like mole rats create an intricate network of underground tunnels, the cyber threat group known as Molerats has expertly burrowed its way through the digital...

View Article
Browsing all 524 articles
Browse latest View live