Quantcast
Channel: SOCRadar® Cyber Intelligence Inc.
Browsing all 549 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Buyer’s Guide to Extended Threat Intelligence – SOCRadar

The Buyer’s Guide to Extended Threat Intelligence – SOCRadar Imagine walking into the office on a regular Tuesday morning. As the CISO, you grab your coffee, sit at your desk, and are immediately...

View Article


Image may be NSFW.
Clik here to view.

Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Data Exposed

Phishing Template Targets U.S. Candidates; RobbinHood Tool and KFC Data Exposed The SOCRadar Dark Web Team continues its diligent monitoring of the hacker landscape; several significant cyber threats...

View Article


Image may be NSFW.
Clik here to view.

Major Cyber Attacks in Review: August 2024

Major Cyber Attacks in Review: August 2024 August 2024 witnessed a series of impactful cyber attacks targeting industries from airport services in Canada to key financial institutions in the U.S. This...

View Article

Image may be NSFW.
Clik here to view.

Cyber Insurance and Protecting Against Security Breaches

Cyber Insurance and Protecting Against Security Breaches With the rise of digital threats, cyber insurance has become an important part of risk management for businesses of all sizes. As cyberattacks...

View Article

Image may be NSFW.
Clik here to view.

SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead of Cyber...

SOCRadar Threat Actor Tracking: Your Ultimate Guide to Staying Ahead of Cyber Threats Cyber threats come in many forms, driven by diverse motivations from ransomware that seeks financial gain to...

View Article


Image may be NSFW.
Clik here to view.

Top 10 Free Penetration Testing Tools

Top 10 Free Penetration Testing Tools Penetration testing, or pentesting, is a security practice where real-world attacks are simulated on an organization’s systems to identify vulnerabilities and...

View Article

Image may be NSFW.
Clik here to view.

Critical Patches Released for VMware vCenter Server and GitLab...

Critical Patches Released for VMware vCenter Server and GitLab (CVE-2024-38812, CVE-2024-45409) Broadcom recently issued important patches for VMware, addressing two critical vulnerabilities in its...

View Article

Image may be NSFW.
Clik here to view.

UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War an...

UK Threat Landscape Report: The Cyber Impact of the Russia-Ukraine War an Overview As the Russia-Ukraine war unfolds, its impact extends far beyond the battlefield, rippling through cyberspace and...

View Article


Image may be NSFW.
Clik here to view.

Safeguarding Your Business: The Importance of Fraud Protection

Safeguarding Your Business: The Importance of Fraud Protection In the past, banks employed various methods to protect their customers’ money. They installed heavy-duty vaults made of steel and iron to...

View Article


Image may be NSFW.
Clik here to view.

How the FBI Dismantled Raptor Train, a Major China State-Sponsored Botnet

How the FBI Dismantled Raptor Train, a Major China State-Sponsored Botnet In a major breakthrough, the FBI has recently dismantled “Raptor Train,” an extensive botnet controlled by state-sponsored...

View Article

Image may be NSFW.
Clik here to view.

Dark Web Profile: Just Evil

Dark Web Profile: Just Evil Just Evil is a pro-Russian cyber threat group formed in January 2024 by KillMilk. This group emerged following internal changes within KillNet, particularly regarding its...

View Article

Image may be NSFW.
Clik here to view.

Critical Vulnerability in Ivanti Cloud Services Appliance (CSA) Exploited in...

Critical Vulnerability in Ivanti Cloud Services Appliance (CSA) Exploited in Attacks: CVE-2024-8963 Ivanti has disclosed a critical vulnerability identified as CVE-2024-8963, affecting its Cloud...

View Article

Image may be NSFW.
Clik here to view.

Deloitte Breach, Star Health Data, 100 Million Stealer Logs for Sale

Deloitte Breach, Star Health Data, 100 Million Stealer Logs for Sale Recent findings by the SOCRadar Dark Web Team reveal a series of alarming cyber incidents. Among them is the alleged data leak of...

View Article


Image may be NSFW.
Clik here to view.

Chrome Security Evolution and Impact on Stealer Logs in the Underground Market

Chrome Security Evolution and Impact on Stealer Logs in the Underground Market As one of the most widely used web browsers globally, Google Chrome is critical in protecting user data from cyber...

View Article

Image may be NSFW.
Clik here to view.

How Machine Learning is Revolutionizing Cybersecurity

How Machine Learning is Revolutionizing Cybersecurity In today’s digital age, cyber threats multiply at an alarming rate, putting enormous pressure on organizations to strengthen their defenses. A...

View Article


Image may be NSFW.
Clik here to view.

Critical Ivanti vTM Vulnerability Exploited (CVE-2024-7593); pgAdmin Flaw...

Critical Ivanti vTM Vulnerability Exploited (CVE-2024-7593); pgAdmin Flaw Could Expose Data (CVE-2024-9014) Critical vulnerabilities in Ivanti vTM and PostgreSQL’s pgAdmin tool have recently come under...

View Article

Image may be NSFW.
Clik here to view.

Top 10 CISO Statistics and Trends in Cybersecurity for 2024

Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-day...

View Article


Image may be NSFW.
Clik here to view.

Severe Vulnerabilities in Cisco IOS, IOS XE and Other Products Addressed –...

Severe Vulnerabilities in Cisco IOS, IOS XE and Other Products Addressed – Patch Now Cisco, a leading provider of network technologies, has issued new security advisories addressing 16 vulnerabilities...

View Article

Image may be NSFW.
Clik here to view.

Critical Vulnerabilities in Pure Storage & Aruba Access Points Pose...

Critical Vulnerabilities in Pure Storage & Aruba Access Points Pose Unauthorized Access, RCE Risks Security updates were released addressing critical vulnerabilities in both Pure Storage and Aruba...

View Article

Image may be NSFW.
Clik here to view.

The Exodus Began: Alternatives for Telegram

The Exodus Began: Alternatives for Telegram As Telegram implements new policies to curb illegal activities by using AI to detect and hide unlawful content, threat actors are increasingly moving away...

View Article
Browsing all 549 articles
Browse latest View live