Top 10 Dark Web Search Engines in 2025
Top 10 Dark Web Search Engines in 2025 A lot has changed since we last covered the top 5 Dark Web search engines. Some search engines are still around, while others have shut down or become unreliable....
View ArticleInside the Minds of Hackers: Using Dark Web Intelligence to Supercharge...
Inside the Minds of Hackers: Using Dark Web Intelligence to Supercharge Pentesting & Red Teaming In 2024, cybersecurity threats surged to unprecedented levels, with the average cost of a data...
View ArticleMozilla Responds to Critical Vulnerability: Urgent Firefox Update
Mozilla Responds to Critical Vulnerability: Urgent Firefox Update In a rapid response to a similar vulnerability with Google Chrome, Mozilla has issued an update for its Firefox browser on Windows to...
View ArticleMajor Cyber Attacks Targeting Transportation & Logistics Industry
Major Cyber Attacks Targeting Transportation & Logistics Industry The global transportation and logistics industry is the backbone of modern commerce, enabling the smooth flow of goods and services...
View ArticleAlleged Check Point Breach: What Happened and What You Need to Know?
Alleged Check Point Breach: What Happened and What You Need to Know? [Update] April 2, 2025: “Latest Developments: Dissecting CoreInjection’s Claims and the Alleged Leak” On March 31, 2025, a threat...
View ArticleCyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany
Cyber Threats Hit TAP Air, Check Point, Dell, and Samsung Germany This week, SOCRadar’s Dark Web Team uncovered several notable cyber threats circulating on hacker forums. Among the key findings are an...
View ArticleCrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): What You...
CrushFTP Vulnerability Under Active Exploitation (CVE-2025-31161): What You Need to Know A newly discovered flaw in the CrushFTP file transfer platform is under active exploitation, with threat actors...
View ArticleTop 10 Dark Web Monitoring Tools
Top 10 Dark Web Monitoring Tools Imagine a place on the internet where rules don’t exist, identities are masked, and secrets are currency. Welcome to the dark web—a digital underworld where...
View ArticleThe Blogpost Based Phishing Attacks
The Blogpost Based Phishing Attacks Recently, the increase in Blogspot-based phishing sites has drawn attention. Threat actors are taking advantage of Blogspot’s free and seemingly reliable...
View ArticleEverything You Need to Know About the Alleged Twilio SendGrid Breach
Everything You Need to Know About the Alleged Twilio SendGrid Breach On April 3, 2025, a threat actor operating under the alias Satanic announced on BreachForums that they were in possession of a...
View ArticleUNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE &...
UNC5221 Targets Critical Ivanti Flaw (CVE-2025-22457) with TRAILBLAZE & BRUSHFIRE Malware A recently disclosed critical vulnerability in Ivanti products, CVE-2025-22457, has drawn urgent attention...
View ArticleDark Web Sees New Market Launch, Credit Card and VPN Access Sales
Dark Web Sees New Market Launch, Credit Card and VPN Access Sales SOCRadar’s Dark Web Team has identified several new threats emerging on hacker forums in the last week. Highlights include the...
View ArticleStorm-2372: Russian APT Using Device Code Phishing in Advanced Attacks
Storm-2372: Russian APT Using Device Code Phishing in Advanced Attacks A newly uncovered cyber campaign led by the Russian state-backed group Storm-2372 is exploiting device code phishing to bypass...
View ArticleApril 2025 Android Update: Actively Exploited Kernel Bugs and Remote...
April 2025 Android Update: Actively Exploited Kernel Bugs and Remote Privilege Escalation Threat Google has just released its April 2025 Android security bulletin, addressing a broad spectrum of...
View ArticleTop 5 Threats to Mobile Banking Security and How to Avoid Them
Top 5 Threats to Mobile Banking Security and How to Avoid Them Mobile banking has become essential for convenient financial management in the digital age. However, this convenience also brings the risk...
View ArticleApril 2025 Patch Tuesday: Microsoft Addresses 126 Vulnerabilities Including...
April 2025 Patch Tuesday: Microsoft Addresses 126 Vulnerabilities Including Actively Exploited CLFS Zero-Day Microsoft’s April 2025 Patch Tuesday brings an extensive set of updates aimed at shoring up...
View ArticleCritical Fortinet Vulnerability (CVE-2024-48887) Puts FortiSwitch Admin...
Critical Fortinet Vulnerability (CVE-2024-48887) Puts FortiSwitch Admin Credentials at Risk A newly disclosed critical vulnerability in Fortinet’s FortiSwitch product line is raising urgent security...
View ArticleDark Web Profile: Babuk/Babuk2
Dark Web Profile: Babuk/Babuk2 Babuk, originally emerging in 2020, became infamous for its ransomware attacks on large organizations and government agencies. After internal conflicts led to the leak of...
View ArticleThe Role of Ethical Hackers in Cybersecurity: Protecting the Digital World
The Role of Ethical Hackers in Cybersecurity: Protecting the Digital World With cyber threats emerging at an unprecedented rate, ethical hackers play an important role in detecting vulnerabilities...
View ArticleHow Threat Intelligence Helps You Navigate the TIBER-EU Framework
How Threat Intelligence Helps You Navigate the TIBER-EU Framework What is TIBER-EU and Why Does It Matter? TIBER-EU (Threat Intelligence-Based Ethical Red Teaming) is widely recognized as a leading...
View Article