Key Insights from the 2024 End-of-Year Report: Preparing for Cyber Threats in...
Key Insights from the 2024 End-of-Year Report: Preparing for Cyber Threats in 2025 The cyber threat landscape in 2024 witnessed an unprecedented surge in sophisticated attacks, with cybercriminals...
View ArticleInternational Operation Targets 8Base and Phobos Ransomware Gangs
International Operation Targets 8Base and Phobos Ransomware Gangs In a coordinated global effort, law enforcement agencies have successfully dismantled the dark web infrastructure of the 8Base...
View ArticleFebruary 2025 Patch Tuesday: Microsoft Fixes 63 Vulnerabilities, Including...
February 2025 Patch Tuesday: Microsoft Fixes 63 Vulnerabilities, Including Two Actively Exploited Zero-Days Microsoft’s latest Patch Tuesday update for February 2025 delivers important security fixes,...
View ArticleLazarus Group’s Latest Cyber Espionage Tactics Involving LinkedIn
Lazarus Group’s Latest Cyber Espionage Tactics Involving LinkedIn The Lazarus Group, a North Korean government-backed hacking team, has increased its spying efforts by taking advantage of work...
View ArticleIvanti Security Update Addresses Severe Vulnerabilities in ICS, IPS, and ISAC...
Ivanti Security Update Addresses Severe Vulnerabilities in ICS, IPS, and ISAC (CVE-2025-22467, CVE-2024-38657, CVE-2024-10644) In response to newly identified vulnerabilities, Ivanti has released...
View ArticleDark Web Profile: Fog Ransomware
Dark Web Profile: Fog Ransomware Fog Ransomware emerged in April 2024, was first detected in the wild in early May, primarily targeting US based educational institutions targeting both Windows and...
View ArticlePalo Alto Firewall Vulnerability (CVE-2025-0108) Under Attack – Are You at Risk?
Palo Alto Firewall Vulnerability (CVE-2025-0108) Under Attack – Are You at Risk? Palo Alto Networks has addressed a newly discovered authentication bypass vulnerability, CVE-2025-0108 (CVSS 7.8), that...
View ArticleTop 10 Advanced Persistent Threat (APT) Groups That Dominated 2024
Top 10 Advanced Persistent Threat (APT) Groups That Dominated 2024 Advanced Persistent Threats (APTs) are among the most sophisticated and persistent cyber adversaries in the world. Unlike ordinary...
View ArticleMassive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban Service...
Massive Swiss Medical Leak, Binance Phishing Panel, and WhatsApp Ban Service Found SOCRadar’s Dark Web Team has uncovered several alarming cyber threats circulating on hacker forums this week. Key...
View ArticleEagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs
EagerBee: Advanced Backdoor Attacks on Middle Eastern Governments and ISPs In recent years, the cybersecurity landscape has witnessed a surge in sophisticated and highly targeted cyberattacks, with the...
View ArticleAlarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards...
Alarming Dark Web Leak: B1ack’s Stash Releases 4 Million Stolen Credit Cards for Free The Dark Web marketplace B1ack’s Stash has stirred concerns by leaking 4 million stolen credit card details for...
View ArticleA New Wave of Ransomware Campaigns Targeting Microsoft Teams
A New Wave of Ransomware Campaigns Targeting Microsoft Teams For companies all over the globe, Microsoft Teams is becoming an essential tool for teamwork. Nevertheless, because of its extensive use, it...
View ArticleProtect Your Social Media Data from AI Training: Opt-Out Options & Privacy Tips
Protect Your Social Media Data from AI Training: Opt-Out Options & Privacy Tips In today’s digital-first world, social media is central to our daily lives. But did you know AI systems can train on...
View ArticleSecurity Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025-26465,...
Security Flaws in OpenSSH and Juniper Networks Demand Action (CVE-2025-26465, CVE-2025-26466, and CVE-2025-21589) Recent discoveries have revealed severe vulnerabilities in two widely used networking...
View ArticleBest Secure Browsers for 2025: A Comparison Guide
Best Secure Browsers for 2025: A Comparison Guide Your browser is your ship on the vast internet sea. It determines your safety first, followed by your speed and path. Choosing a secure browser is not...
View ArticleChinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 &...
Chinese APT Exploits Cisco IOS XE Vulnerabilities (CVE-2023-20198 & CVE-2023-20273) in Global Attacks An ongoing cyber campaign targets unpatched Cisco IOS XE software used in telecommunications...
View ArticleMicrosoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw...
Microsoft Patches Power Pages Zero-Day (CVE-2025-24989) & Recent PAN-OS Flaw (CVE-2025-0111) Joins CISA KEV Two major security flaws pose a serious exploitation risk for organizations using...
View ArticleBlack Basta’s Internal Chats Leak: Everything You Need to Know
Black Basta’s Internal Chats Leak: Everything You Need to Know (21.02.2025) Update: List of Domains in Leaked Chats (21.02.2025) Update: SOCRadar’s Intelligence Findings of Black Basta Leak, IoCs,...
View ArticleTop 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2025 In 2023, we compiled a list of the top free Cyber Threat Intelligence (CTI) sources to help security teams stay ahead of evolving...
View ArticleSeraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, New...
Seraph Stealer Malware Hits the Market, Black Basta’s Internal Chaos, New Data Leak Claims Cybercriminal activity continues to escalate on hacker forums, with SOCRadar’s Dark Web Team identifying...
View Article