Velvet Ant’s Strategic Targeting: A Long-Term Cyber Espionage Campaign...
Velvet Ant’s Strategic Targeting: A Long-Term Cyber Espionage Campaign Against F5 BIG-IP Systems In the constantly evolving landscape of cybersecurity, the Velvet Ant Advanced Persistent Threat (APT)...
View ArticleEverything You Need to Know About Dark Web and Deep Web
Everything You Need to Know About Dark Web and Deep Web The Internet encompasses an extensive and intricate network that goes well beyond the familiar surface websites we frequently visit. Two terms...
View ArticleCritical HTTP File Server Vulnerability (CVE-2024-23692) Actively Exploited...
Critical HTTP File Server Vulnerability (CVE-2024-23692) Actively Exploited to Deploy Cryptomining Malware, RATs, Stealers Researchers have identified active exploitation targeting a critical...
View ArticleDark Web Profile: Brain Cipher
Dark Web Profile: Brain Cipher The Brain Cipher ransomware group gained widespread attention after a high-profile attack on Indonesia’s National Data Center (Pusat Data Nasional – PDN), which disrupted...
View ArticleDark Peep #15: The Perfect Heist Partner
Dark Peep #15: The Perfect Heist Partner Welcome back to Dark Peep, your backstage pass to the wildest cyber drama on the dark web. In this blockbuster fifteenth edition, the FBI’s raid on BreachForums...
View ArticleTop 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware,...
Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware, Phishing, Industry Trends, and More) Welcome to our roundup of the Top 50 Cybersecurity Statistics in 2024. As cyber threats...
View ArticlePi-hole RCE Exploit, Netflix Scam Pages, Rockwell Access Sale, and Massive...
Pi-hole RCE Exploit, Netflix Scam Pages, Rockwell Access Sale, and Massive Password Leak The SOCRadar Dark Web Team has identified multiple critical cyber incidents, highlighting ongoing threats to...
View ArticleCyber Security Aspect of the 2024 NATO Summit
Cyber Security Aspect of the 2024 NATO Summit [Update] July 11, 2024: “Washington Summit Declaration” The idea of building alliances was already important for increasing the security of kingdoms and...
View ArticleJuly 2024 Patch Tuesday Fixes 139 CVEs, Actively Exploited Zero-Days; CISA...
July 2024 Patch Tuesday Fixes 139 CVEs, Actively Exploited Zero-Days; CISA Highlights Citrix Updates [Update] July 11, 2024: “Proof-of-Concept Exploit Available for SharePoint RCE Vulnerabilities”...
View ArticleMajor Cyber Attacks in Review: June 2024
Major Cyber Attacks in Review: June 2024 June 2024 has been a whirlwind of significant cyber attacks targeting high-profile organizations worldwide. Following the ongoing Snowflake-related issues, the...
View ArticleMicrosoft Fixes CVE-2024-38112 After Over a Year of Exploitation; Zero-Click...
Microsoft Fixes CVE-2024-38112 After Over a Year of Exploitation; Zero-Click Threat of CVE-2024-38021 Microsoft’s most recent Patch Tuesday updates addressed a high-severity zero-day vulnerability that...
View ArticleTop 10 SOAR Platforms
Top 10 SOAR Platforms Security Orchestration, Automation, and Response (SOAR) platforms have become critical tools for improving security operations. These platforms integrate and automate security...
View ArticleMajor Cyber Attacks Targeting the Automotive Industry
Major Cyber Attacks Targeting the Automotive Industry Due to its growing connectivity and perceived vulnerabilities, the Automotive Industry is increasingly targeted by cyberattacks, like data breaches...
View ArticleLatest Dark Web Leaks: Disney Slack, U.S. Credit Cards, 1TX Vendor Database
Latest Dark Web Leaks: Disney Slack, U.S. Credit Cards, 1TX Vendor Database The SOCRadar Dark Web Team has identified several significant data breaches and cyber threats involving prominent...
View ArticleThe 2024 Mid-Year Cybersecurity Review Report
The 2024 Mid-Year Cybersecurity Review Report In a time when cyber threats continue to escalate in sophistication and frequency, understanding the evolving landscape is more crucial than ever....
View ArticleKey Threat Intelligence Sources to Access Current Threat Insights
Key Threat Intelligence Sources to Access Current Threat Insights Using various threat intelligence sources can make the difference between preventing an attack and falling victim to one. An AI...
View ArticleShedding Light on France’s Cyber Threat Landscape
Shedding Light on France’s Cyber Threat Landscape In an era of dynamic change in digital threats, there is more need for knowledge of regional cybersecurity challenges than ever. Therefore, it is with...
View ArticleSOCRadar’s Global Ransomware Report 2024: Gain Insights Into Worldwide...
SOCRadar’s Global Ransomware Report 2024: Gain Insights Into Worldwide Ransomware Trends As 2024 passes by, ransomware remains a major concern for organizations across the globe. In order to see the...
View ArticleExecutive Interview: Emerging Trends and Effective Strategies from GCISO Dan...
Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin In our ongoing series of CISO interviews, we are excited to share insights from Dan Maslin, the Group Chief...
View ArticleCritical Vulnerabilities in SolarWinds ARM, Serv-U, and Cisco SSM On-Prem,...
Critical Vulnerabilities in SolarWinds ARM, Serv-U, and Cisco SSM On-Prem, Secure Email Gateway Products Technology giants SolarWinds and Cisco have recently released security advisories addressing...
View Article