Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s...
Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s Latest Attack Vector Recently, vulnerabilities in Cleo’s file transfer software (including Cleo Harmony, VLTrader, and...
View ArticleUnveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience
Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience As India experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cyber...
View ArticleDark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures
Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures If the events from dark web this series were a script, it would be the kind of thriller where everyone fumbles their part....
View ArticleCanada’s Top Cybersecurity Threats: How Attackers Target Critical Industries
Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries As Canada experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cyber...
View ArticleDark Web Market: BidenCash
Dark Web Market: BidenCash Dark web markets have become a thriving hub for cybercriminals, trading stolen data, compromised credentials, and illicit tools. Among these, BidenCash has emerged as a...
View ArticleThe Year of Takedowns: Significant Law Enforcement Operations of 2024
The Year of Takedowns: Significant Law Enforcement Operations of 2024 As 2024 comes to a close, the global fight against cybercrime has witnessed a series of groundbreaking law enforcement operations...
View ArticleCritical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Execution;...
Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Execution; Next.js Auth Bypass (CVE-2024-51479) Fortinet and the popular React framework Next.js have recently addressed serious...
View ArticleSophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities...
Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729) Recent security patches for Sophos Firewall address several serious...
View ArticleBeyondTrust Security Incident — Command Injection and Escalation Weaknesses...
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two...
View ArticleUnderstanding Identity and Access Management (IAM)
Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and remote work have become the norm, managing who has access to sensitive data and systems will...
View ArticleDark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com Access...
Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com Access Sale SOCRadar’s Dark Web Team uncovered alarming activity on hacker forums, including a powerful new Mirai botnet service for...
View ArticleFlexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out
Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out In today’s fast-paced cybersecurity landscape, Managed Security Service Providers (MSSPs) face mounting pressure to deliver comprehensive...
View ArticleStuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybersecurity
Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybersecurity Cyber weapons have emerged as powerful tools for nation-states, fundamentally altering the cybersecurity landscape. These...
View ArticleSevere Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-53961),...
Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-53961), Update Now A critical vulnerability in Adobe ColdFusion versions 2023 and 2021 has prompted urgent security updates....
View ArticleDark Web Profile: Bashe (APT73)
Dark Web Profile: Bashe (APT73) Bashe, previously known as APT73 or Eraleig, is a ransomware group that emerged in 2024, employing tactics reminiscent of LockBit to target critical industries across...
View ArticleHow to Protect Against Digital Risks in Three Steps
How to Protect Against Digital Risks in Three Steps threats to an organization’s digital assets are constantly evolving, cybercriminals are no longer solely focused on breaching your internal network;...
View ArticleTop Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re...
Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re Fired’ Campaign Phishing remains one of the most prevalent and effective cyber attack methods, thriving on deception to...
View ArticleDarkVision RAT: A Persistent Threat Delivered via PureCrypter
DarkVision RAT: A Persistent Threat Delivered via PureCrypter The DarkVision RAT malware campaign leverages the PureCrypter loader to infiltrate networks and compromise data across multiple sectors....
View ArticleDark Web Profile: Trinity Ransomware
Dark Web Profile: Trinity Ransomware First discovered in May 2024, the Trinity ransomware has quickly positioned itself as a significant actor in the threat landscape. Leveraging a double extortion...
View ArticleCyber Threat Intelligence for Supply Chain Security
Cyber Threat Intelligence for Supply Chain Security Modern supply chains are more connected than ever, forming the backbone of global commerce. However, this interconnectivity also makes them prime...
View Article