Top 20 Cybersecurity Conferences and Events to Attend in 2025
Top 20 Cybersecurity Conferences and Events to Attend in 2025 As cyber threats become more complex, staying updated on the latest security trends is more critical than ever. Attending top cybersecurity...
View ArticleX Faces Cyberattack: Dark Storm Team Takes Credit, Musk Blames Ukraine
X Faces Cyberattack: Dark Storm Team Takes Credit, Musk Blames Ukraine Yesterday, X (formerly Twitter) allegedly suffered a large-scale cyberattack, causing widespread outages. While Elon Musk claimed...
View ArticleTop 20 Free APIs for Cybersecurity: Threat Intelligence, Malware Analysis & More
Top 20 Free APIs for Cybersecurity: Threat Intelligence, Malware Analysis & More APIs matter because they serve as the glue that connects different software applications, enabling seamless...
View ArticleMarch 2025 Patch Tuesday: Microsoft Fixes 6 Critical & 6 Exploited Security...
March 2025 Patch Tuesday: Microsoft Fixes 6 Critical & 6 Exploited Security Vulnerabilities Microsoft has released its highly anticipated March 2025 Patch Tuesday update, tackling a staggering 57...
View ArticleGitLab Security Update: Critical Authentication & RCE Flaws Demand Immediate...
GitLab Security Update: Critical Authentication & RCE Flaws Demand Immediate Action Cybersecurity threats continue to evolve, and organizations relying on GitLab for code hosting, collaboration,...
View ArticleMajor Cyber Attacks Targeting the Finance Industry
Major Cyber Attacks Targeting the Finance Industry The finance industry is an attractive target for cybercriminals due to the large amounts of sensitive data and financial assets at stake. Over the...
View ArticleExploring MiniMedusa: The Streamlined DDoS Configuration Derived from MegaMedusa
Exploring MiniMedusa: The Streamlined DDoS Configuration Derived from MegaMedusa Distributed Denial of Service (DDoS) attacks continue to pose significant challenges in cybersecurity. Tools like...
View ArticleAUTOSUR Breach, FiveM Database Leak, Disney+ Account Checker, Crypto Leads &...
AUTOSUR Breach, FiveM Database Leak, Disney+ Account Checker, Crypto Leads & Forex Scams Exposed Cybercriminals continue to target industries worldwide, with SOCRadar’s Dark Web Team uncovering a...
View ArticleMajor Cyber Attacks in Review: February 2025
Major Cyber Attacks in Review: February 2025 In February 2025, several major cyber incidents demonstrated ongoing threats to industries worldwide. The Qilin ransomware attack disrupted operations at...
View ArticleApache Tomcat RCE Vulnerability (CVE-2025-24813) Under Active Exploitation:...
Apache Tomcat RCE Vulnerability (CVE-2025-24813) Under Active Exploitation: Patch Now A serious vulnerability in Apache Tomcat, CVE-2025-24813, is being actively exploited in the wild. This flaw allows...
View ArticleWindows Shortcut Zero-Day (ZDI-CAN-25373) Exploited by State-Backed Threat...
Windows Shortcut Zero-Day (ZDI-CAN-25373) Exploited by State-Backed Threat Actors Since 2017: Overview of Key Details A sophisticated zero-day vulnerability, ZDI-CAN-25373, has been secretly exploited...
View ArticleDark Web Profile: FSociety (Flocker) Ransomware
Dark Web Profile: FSociety (Flocker) Ransomware FSociety or Flocker ransomware, discovered in 2024, is a relatively new strain operating as Ransomware-as-a-Service (RaaS), enabling cybercriminals to...
View ArticleCritical Veeam Vulnerability (CVE-2025-23120) Enables Remote Code Execution...
Critical Veeam Vulnerability (CVE-2025-23120) Enables Remote Code Execution by Domain Users A newly discovered vulnerability in Veeam Backup & Replication, tracked as CVE-2025-23120, has emerged as...
View ArticleOracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik...
Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik Data Leak This week, SOCRadar’s Dark Web Team uncovered a series of high-risk activities surfacing on hacker forums. Key...
View ArticleNext.js Middleware Vulnerability (CVE-2025-29927): What You Need to Know and...
Next.js Middleware Vulnerability (CVE-2025-29927): What You Need to Know and How to Respond A critical security flaw has recently shaken the Next.js ecosystem, bringing urgent attention to the...
View ArticleDark Web Market: Russian Market
Dark Web Market: Russian Market Russian Market or Russian Markat is a Dark Web Market (DWM) that emerged in 2019, specializing in the sale of stolen data, including credentials, financial information,...
View ArticleArkana Ransomware Attack on WideOpenWest: What You Need to Know
Arkana Ransomware Attack on WideOpenWest: What You Need to Know A previously unknown threat actor has launched its first ransomware attack, marking a worrisome new chapter in the cyber threat...
View ArticleEverything You Need to Know About Oracle Cloud Security Incident by rose87168
Everything You Need to Know About Oracle Cloud Security Incident by rose87168 rose87168 is the alias of a hacker who claims to have breached Oracle Cloud, allegedly stealing around 6 million sensitive...
View ArticleIngress Nightmare: Critical Unauthenticated Remote Code Execution...
Ingress Nightmare: Critical Unauthenticated Remote Code Execution Vulnerabilities in Ingress NGINX On March 24, 2025, the Kubernetes Security Response Committee released a patch for a set of high to...
View ArticleNATO’s Digital Frontiers Threat Landscape Report
NATO’s Digital Frontiers Threat Landscape Report In today’s interconnected world, the security of nations extends far beyond physical borders. The cyber domain has emerged as a critical battleground...
View Article