Tesla Charging Stations, Banque de France, and NOQ Group Targeted on Dark Web
Tesla Charging Stations, Banque de France, and NOQ Group Targeted on Dark Web SOCRadar’s Dark Web Team has highlighted a range of concerning cyber threats since last week. Among these are the launch of...
View ArticleTop 10 Security Tips for Online Shopping (Black Friday Edition)
Top 10 Security Tips for Online Shopping (Black Friday Edition) Black Friday and Cyber Monday are two of the year’s most anticipated shopping events, and cybercriminals know this all too well. After...
View ArticlePerfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and...
Perfctl Campaign Exploits Millions of Linux Servers for Crypto Mining and Proxyjacking Linux servers, the backbone of countless organizations worldwide, have recently come under siege by a stealthy and...
View ArticleCritical QNAP Vulnerabilities in Notes Station 3 and QuRouter Demand...
Critical QNAP Vulnerabilities in Notes Station 3 and QuRouter Demand Immediate Patching (CVE-2024-38645, CVE-2024-38643, CVE-2024-48860) QNAP recently released multiple security advisories addressing a...
View ArticleWhy is SOCRadar the Preferred Choice for CISOs?
Why is SOCRadar the Preferred Choice for CISOs? Chief Information Security Officers (CISOs) are under constant pressure to safeguard their organizations against sophisticated threats while maximizing...
View ArticleHow to Overcome Dark Web Risks in Your Industry – CISO Edition
How to Overcome Dark Web Risks in Your Industry – CISO Edition The dark web has evolved into a vast and thriving marketplace for stolen data, illicit services, and cybercrime tools. For Chief...
View ArticleRomCom Backdoor Attacks Use Zero-Day Exploits in Mozilla and Windows...
RomCom Backdoor Attacks Use Zero-Day Exploits in Mozilla and Windows (CVE-2024-9680 & CVE-2024-49039) Recent research has revealed how the RomCom cyber threat group exploited two zero-day...
View ArticleThe Dark Web and Cybercrime: How Hidden Networks Operate
The Dark Web and Cybercrime: How Hidden Networks Operate The Dark Web represents the concealed segment of networks where anonymity reigns supreme. While not inherently illegal, its infrastructure has...
View ArticleDark Web Market: Abacus Market
Dark Web Market: Abacus Market Abacus Market has emerged as a prominent player in the dark web ecosystem, offering a platform for illicit goods and services. Launched in September 2021 as a response to...
View ArticleZyxel Firewalls Exploited for Ransomware Attacks; 20 Security Flaws...
Zyxel Firewalls Exploited for Ransomware Attacks; 20 Security Flaws Discovered in Advantech Access Points New security vulnerabilities emerge daily, forcing organizations to continuously monitor their...
View ArticleDark Web Alerts: Xeno RAT, OneCard Data, and Israeli Credit Cards
Dark Web Alerts: Xeno RAT, OneCard Data, and Israeli Credit Cards Recent findings by SOCRadar’s Dark Web Team reveal a surge in cyber threats in hacker forums, including the release of Xeno RAT, a...
View ArticleNordic Threat Landscape Report 2024: Ransomware, Phishing, and Dark Web Insights
Nordic Threat Landscape Report 2024: Ransomware, Phishing, and Dark Web Insights As a digital hub of innovation and economic stability, the Nordic Region—comprising Denmark, Finland, Iceland, Norway,...
View ArticleMost Exploited Vulnerabilities of 2023 (Insights to Define Cybersecurity in...
Most Exploited Vulnerabilities of 2023 (Insights to Define Cybersecurity in 2025) As we near the close of 2024, cybersecurity remains a top priority for organizations navigating an increasingly hostile...
View ArticleInternational Operation Dismantles MATRIX: A Sophisticated Encrypted...
International Operation Dismantles MATRIX: A Sophisticated Encrypted Messaging Service The importance of international collaboration in the fight against cybercrime has once again been demonstrated....
View ArticleOld Cisco ASA Vulnerability (CVE-2014-2120) Fuels Androxgh0st Botnet Activity
Old Cisco ASA Vulnerability (CVE-2014-2120) Fuels Androxgh0st Botnet Activity Cisco has issued a fresh warning regarding CVE-2014-2120, a decade-old vulnerability in its Adaptive Security Appliance...
View ArticleVeeam Service Provider Console (VSPC) Users Urged to Patch CVE-2024-42448 and...
Veeam Service Provider Console (VSPC) Users Urged to Patch CVE-2024-42448 and CVE-2024-42449 Veeam has recently released patches addressing two serious security vulnerabilities in its Service Provider...
View ArticleThe Role of Predictive Analytics in Preventing Cyber Attacks
The Role of Predictive Analytics in Preventing Cyber Attacks Digital threats of today require cybersecurity strategies to anticipate and neutralize cyber attacks before they occur. This is where...
View ArticleHow Tariffs Impact Supply Chain Security and Strategies to Mitigate Risks
How Tariffs Impact Supply Chain Security and Strategies to Mitigate Risks Recent announcements regarding new tariffs on China, Mexico, and Canada highlight a looming shift in global trade dynamics....
View ArticleManson Market Takedown: Europol Aids Law Enforcement Operation to Disrupt...
Manson Market Takedown: Europol Aids Law Enforcement Operation to Disrupt Online Fraud The digital age has opened the way for increasingly sophisticated cybercriminal networks. These groups target...
View ArticleTop 10 Major Cyber Attacks Targeting E-Commerce Industry
Top 10 Major Cyber Attacks Targeting E-Commerce Industry The e-commerce industry has transformed global commerce, offering convenience and accessibility to millions of consumers worldwide. However,...
View Article