Quantcast
Channel: SOCRadar® Cyber Intelligence Inc.
Browsing all 542 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s...

Cleo File Transfer Vulnerabilities (CVE-2024-50623, CVE-2024-55956) – Cl0P’s Latest Attack Vector Recently, vulnerabilities in Cleo’s file transfer software (including Cleo Harmony, VLTrader, and...

View Article


Image may be NSFW.
Clik here to view.

Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience 

Unveiling India’s Cyber Threat Landscape: Data, Trends, and Resilience As India experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cyber...

View Article


Image may be NSFW.
Clik here to view.

Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures

Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures If the events from dark web this series were a script, it would be the kind of thriller where everyone fumbles their part....

View Article

Image may be NSFW.
Clik here to view.

Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries

Canada’s Top Cybersecurity Threats: How Attackers Target Critical Industries As Canada experiences rapid digital growth across various sectors, it has become an increasingly attractive target for cyber...

View Article

Image may be NSFW.
Clik here to view.

Dark Web Market: BidenCash

Dark Web Market: BidenCash Dark web markets have become a thriving hub for cybercriminals, trading stolen data, compromised credentials, and illicit tools. Among these, BidenCash has emerged as a...

View Article


Image may be NSFW.
Clik here to view.

The Year of Takedowns: Significant Law Enforcement Operations of 2024

The Year of Takedowns: Significant Law Enforcement Operations of 2024 As 2024 comes to a close, the global fight against cybercrime has witnessed a series of groundbreaking law enforcement operations...

View Article

Image may be NSFW.
Clik here to view.

Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Execution;...

Critical Path Traversal in FortiWLM (CVE-2023-34990) Permits Code Execution; Next.js Auth Bypass (CVE-2024-51479) Fortinet and the popular React framework Next.js have recently addressed serious...

View Article

Image may be NSFW.
Clik here to view.

Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities...

Sophos Firewall Update Resolves RCE and Privilege Escalation Vulnerabilities (CVE-2024-12727, CVE-2024-12728, CVE-2024-12729) Recent security patches for Sophos Firewall address several serious...

View Article


Image may be NSFW.
Clik here to view.

BeyondTrust Security Incident — Command Injection and Escalation Weaknesses...

BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two...

View Article


Image may be NSFW.
Clik here to view.

Understanding Identity and Access Management (IAM)

Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and remote work have become the norm, managing who has access to sensitive data and systems will...

View Article

Image may be NSFW.
Clik here to view.

Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com Access...

Dark Web Highlights: Xiaomi Data Exposed, eToro Leak, and Crypto.com Access Sale SOCRadar’s Dark Web Team uncovered alarming activity on hacker forums, including a powerful new Mirai botnet service for...

View Article

Image may be NSFW.
Clik here to view.

Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out

Flexible, Affordable, and MSSP-Ready: Why SOCRadar Stands Out In today’s fast-paced cybersecurity landscape, Managed Security Service Providers (MSSPs) face mounting pressure to deliver comprehensive...

View Article

Image may be NSFW.
Clik here to view.

Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybersecurity

Stuxnet and Beyond: How Nation-State Cyber Weapons Have Changed Cybersecurity Cyber weapons have emerged as powerful tools for nation-states, fundamentally altering the cybersecurity landscape. These...

View Article


Image may be NSFW.
Clik here to view.

Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-53961),...

Severe Path Traversal Vulnerability in Adobe ColdFusion (CVE-2024-53961), Update Now A critical vulnerability in Adobe ColdFusion versions 2023 and 2021 has prompted urgent security updates....

View Article

Image may be NSFW.
Clik here to view.

Dark Web Profile: Bashe (APT73)

Dark Web Profile: Bashe (APT73) Bashe, previously known as APT73 or Eraleig, is a ransomware group that emerged in 2024, employing tactics reminiscent of LockBit to target critical industries across...

View Article


Image may be NSFW.
Clik here to view.

How to Protect Against Digital Risks in Three Steps

How to Protect Against Digital Risks in Three Steps threats to an organization’s digital assets are constantly evolving, cybercriminals are no longer solely focused on breaching your internal network;...

View Article

Image may be NSFW.
Clik here to view.

Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re...

Top Phishing Tricks Attackers Use to Target Employees & The Recent ‘You’re Fired’ Campaign Phishing remains one of the most prevalent and effective cyber attack methods, thriving on deception to...

View Article


Image may be NSFW.
Clik here to view.

DarkVision RAT: A Persistent Threat Delivered via PureCrypter

DarkVision RAT: A Persistent Threat Delivered via PureCrypter The DarkVision RAT malware campaign leverages the PureCrypter loader to infiltrate networks and compromise data across multiple sectors....

View Article

Image may be NSFW.
Clik here to view.

Dark Web Profile: Trinity Ransomware

Dark Web Profile: Trinity Ransomware First discovered in May 2024, the Trinity ransomware has quickly positioned itself as a significant actor in the threat landscape. Leveraging a double extortion...

View Article

Image may be NSFW.
Clik here to view.

Cyber Threat Intelligence for Supply Chain Security

Cyber Threat Intelligence for Supply Chain Security Modern supply chains are more connected than ever, forming the backbone of global commerce. However, this interconnectivity also makes them prime...

View Article
Browsing all 542 articles
Browse latest View live