CUPS Vulnerabilities: What You Need to Know
CUPS Vulnerabilities: What You Need to Know Recent reports have highlighted security vulnerabilities in the Common Unix Printing System (CUPS), a crucial component in many Unix-like systems. These...
View ArticleMajor Leaks: Twitch, Thai Honda, and Erasmus+ Data Allegedly Exposed
Major Leaks: Twitch, Thai Honda, and Erasmus+ Data Allegedly Exposed The SOCRadar Dark Web Team continues to monitor the hacker underground; recent findings include the alleged sale of Thai Honda’s...
View ArticleDark Web Profile: UserSec
Dark Web Profile: UserSec UserSec, a pro-Russian hacktivist group, first gained attention in early 2023. The group actively targets Western governments, organizations, and critical infrastructure,...
View ArticleWhat You Need to Know About the CTI Capability Maturity Model (CTI-CMM)
What You Need to Know About the CTI Capability Maturity Model (CTI-CMM) As cyber threats grow in complexity and frequency, organizations are left grappling with how to respond effectively. Many...
View ArticleFrom the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1
From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1 The first half of the year has been marked by sophisticated attacks, with ransomware incidents reaching alarming new heights and...
View ArticleThe Role of Honeypots in Cybersecurity
The Role of Honeypots in Cybersecurity In the constantly evolving landscape of cybersecurity, organizations employ a variety of tools and strategies to detect and defend against cyber threats. One...
View ArticleRCE Vulnerability in Zimbra (CVE-2024-45519) Actively Exploited,...
RCE Vulnerability in Zimbra (CVE-2024-45519) Actively Exploited, Administrators Advised to Patch Immediately Recently, Zimbra, a widely used email and collaboration platform, addressed a critical...
View ArticleBiometric Security Risks: Beyond Fingerprints and Facial Recognition
Biometric Security Risks: Beyond Fingerprints and Facial Recognition Biometrics, the science of identifying individuals based on their unique physical and behavioral characteristics, has a rich...
View ArticleEducation Industry Threat Landscape Report: Trends, Threats, and Defensive...
Education Industry Threat Landscape Report: Trends, Threats, and Defensive Strategies As the education industry increasingly embraces digital tools and platforms, cyber threats have evolved to target...
View ArticleFoxit Reader Vulnerability (CVE-2024-28888): PoC Code Released, Patch to...
Foxit Reader Vulnerability (CVE-2024-28888): PoC Code Released, Patch to Prevent Attacks Details and a Proof-of-Concept (PoC) exploit code for a serious vulnerability in Foxit Reader have recently...
View ArticleCyber Threats Targeting U.S. Elections in 2024
Cyber Threats Targeting U.S. Elections in 2024 As the 2024 U.S. presidential election approaches, the political atmosphere is charged with significant issues that will undoubtedly shape the campaigns...
View ArticleCosmicSting (CVE-2024-34102) Vulnerability Under Active Exploitation
CosmicSting (CVE-2024-34102) Vulnerability Under Active Exploitation In a concerning development for e-commerce security, threat actors are actively exploiting a critical vulnerability in Adobe...
View ArticleAlleged UAE Credit Cards and BMW Data for Sale, New SMS Bomber Service Detected
Alleged UAE Credit Cards and BMW Data for Sale, New SMS Bomber Service Detected Recent investigations by the SOCRadar Dark Web Team have revealed a series of significant cyber threats. Among them is...
View ArticleFBCS Breach Exposes Millions, Comcast and Truist Bank Affected
FBCS Breach Exposes Millions, Comcast and Truist Bank Affected In February 2024, Financial Business and Consumer Solutions (FBCS), a U.S.-based debt collection agency, experienced a significant data...
View ArticleOverview of the Australian Notifiable Data Breaches Report (H1 2024)
Overview of the Australian Notifiable Data Breaches Report (H1 2024) In September 2024, the Office of the Australian Information Commissioner (OAIC) released its most recent Notifiable Data Breaches...
View ArticleQualcomm Addresses Exploited Zero-Day and a Critical RCE in October 2024...
Qualcomm Addresses Exploited Zero-Day and a Critical RCE in October 2024 Security Bulletin Just yesterday, Qualcomm rolled out its latest monthly security bulletin, addressing numerous vulnerabilities,...
View ArticleInsider Threats: The Hidden Enemy of Cybersecurity
Insider Threats: The Hidden Enemy of Cybersecurity The human factor is one of the most challenging components of cybersecurity, and the topic where the human factor is most evident is insider threats....
View ArticleOctober 2024 Patch Tuesday Update – Microsoft Fixes 117 Vulnerabilities, 2...
October 2024 Patch Tuesday Update – Microsoft Fixes 117 Vulnerabilities, 2 Actively Exploited Zero-Days Microsoft has released its October 2024 Patch Tuesday updates, addressing a total of 117 security...
View ArticleNew Ivanti CSA Zero-Days Under Active Exploitation; Critical RCE in Connect...
New Ivanti CSA Zero-Days Under Active Exploitation; Critical RCE in Connect Secure & Policy Secure Ivanti has alerted its customers to three newly discovered zero-day vulnerabilities in its Cloud...
View ArticleCritical Vulnerabilities in Palo Alto Networks Expedition Could Expose...
Critical Vulnerabilities in Palo Alto Networks Expedition Could Expose Firewall Credentials, Patch Available Palo Alto Networks has released patches addressing a set of critical vulnerabilities in its...
View Article