Internet Archive Data Breach and DDoS Attacks: What You Need to Know
Internet Archive Data Breach and DDoS Attacks: What You Need to Know The Internet Archive has come under spotlight in social platforms and the cybersecurity community as news of a data breach, exposing...
View ArticleMajor Cyber Attacks in Review: September 2024
Major Cyber Attacks in Review: September 2024 September 2024 saw a wave of major cyber attacks hitting critical sectors. BingX and Indodax, two prominent cryptocurrency platforms, suffered combined...
View ArticleThe Rise of Initial Access Brokers on the Dark Web
The Rise of Initial Access Brokers on the Dark Web In recent years, the rise in cyber attacks has been directly linked to a growing network of Initial Access Brokers (IABs). These cybercriminals...
View ArticleBiggest Manufacturing Industry Attacks 2024
Biggest Manufacturing Industry Attacks 2024 In 2024, the manufacturing sector will become a primary target for cyber attacks. According to data from the National Institute of Standards and Technology...
View ArticleVerizon Data Breach, European Credit Cards, and APEC & APERC Databases...
Verizon Data Breach, European Credit Cards, and APEC & APERC Databases Allegedly for Sale Recent reports from the SOCRadar Dark Web Team have uncovered a series of significant cyber threats. Among...
View ArticleBehind the Booking: Money Laundering and Scamming in the Sharing Economy
Behind the Booking: Money Laundering and Scamming in the Sharing Economy The sharing economy refers to a market where individuals can exchange goods and services directly, often facilitated by online...
View ArticleTop 10 Breach and Attack Simulation (BAS) Software in 2024
Top 10 Breach and Attack Simulation (BAS) Software in 2024 In the cyber world, attackers are constantly seeking out new vulnerabilities and weaknesses to exploit. From phishing campaigns to advanced...
View ArticleCritical Vulnerabilities Affecting GitHub Enterprise Server, Kubernetes Image...
Critical Vulnerabilities Affecting GitHub Enterprise Server, Kubernetes Image Builder, and GiveWP Plugin Recently, several critical vulnerabilities have been disclosed, affecting widely used platforms...
View ArticleDark Web Profile: Evil Corp
Dark Web Profile: Evil Corp Evil Corp, also known as Indrik Spider, is a pro-Russian hacktivist group that is involved in large-scale financial cyberattacks. Since 2007, Evil Corp has constantly...
View ArticleAn Overview of Microsoft Digital Defense Report 2024
An Overview of Microsoft Digital Defense Report 2024 The Microsoft Digital Defense Report 2024 offers a detailed view of the increasingly intricate global cybersecurity landscape. The tech giant...
View ArticleBiggest Education Industry Attacks in 2024
Biggest Education Industry Attacks in 2024 The education sector is increasingly becoming a top target for cybercriminals, with a noticeable rise in cyberattacks aimed at schools and universities...
View ArticleDeepFaceLive Tool, Royal Mail and Lyca Mobile Data Leaks, DDoS Attack on Sony...
DeepFaceLive Tool, Royal Mail and Lyca Mobile Data Leaks, DDoS Attack on Sony NNC The SOCRadar Dark Web Team has uncovered a range of alarming cyber threats, including the distribution of a deepfake...
View ArticleCritical VMware Vulnerability Patched Again in vCenter Server: CVE-2024-38812
Critical VMware Vulnerability Patched Again in vCenter Server: CVE-2024-38812 In a recent security disclosure, VMware has patched a critical vulnerability (CVE-2024-38812) affecting its vCenter Server,...
View ArticleIntelBroker’s Alleged Cisco Breach: A Deep Dive into the Claims and Responses
IntelBroker’s Alleged Cisco Breach: A Deep Dive into the Claims and Responses On October 14, 2024, IntelBroker, the notorious threat actor and current admin of popular hacker forum, BreachForums,...
View ArticleScienceLogic SL1 0-Day from Rackspace Breach Added to CISA KEV (CVE-2024-9537)
ScienceLogic SL1 0-Day from Rackspace Breach Added to CISA KEV (CVE-2024-9537) A critical security vulnerability was recently discovered in the ScienceLogic SL1 Portal (formerly EM7), exploited as a...
View ArticleRoundcube Vulnerability (CVE-2024-37383) Exploited in Phishing Attacks...
Roundcube Vulnerability (CVE-2024-37383) Exploited in Phishing Attacks Targeting Government Agencies for Credential Theft A vulnerability in the popular open-source Roundcube Webmail, CVE-2024-37383,...
View ArticleDark Web Market: Exodus Marketplace
Dark Web Market: Exodus Marketplace Hidden within the depths of the cybercriminal world lies Exodus Marketplace – one of the latest malicious platforms making waves for its established system of...
View ArticleWelcome to SOCRadar’s 2024 Brazil Threat Landscape Report!
Welcome to SOCRadar’s 2024 Brazil Threat Landscape Report! As the largest economy in Latin America and a key global player, Brazil’s diverse sectors—ranging from agriculture to technology—are becoming...
View ArticleFortiManager Zero-Day ‘FortiJump’ Is Now Publicly Addressed (CVE-2024-47575)
FortiManager Zero-Day ‘FortiJump’ Is Now Publicly Addressed (CVE-2024-47575) The cybersecurity community is currently focused on a critical vulnerability within Fortinet’s FortiManager, a popular tool...
View ArticleLazarus Exploits Google Chrome Zero-Day to Steal Cryptocurrency in...
Lazarus Exploits Google Chrome Zero-Day to Steal Cryptocurrency in ‘DeTankZone’ Campaign (CVE-2024-4947) Earlier in 2024, the North Korean Lazarus APT group exploited a critical zero-day vulnerability...
View Article