Comprehensive Guide to Threat Vectors in Cybersecurity
Comprehensive Guide to Threat Vectors in Cybersecurity In today’s digital landscape, cybersecurity threats are ever-evolving and increasingly sophisticated. Threat vectors are the various methods or...
View ArticleCritical Bitdefender Patch for GravityZone Update Server: CVE-2024-6980 Could...
Critical Bitdefender Patch for GravityZone Update Server: CVE-2024-6980 Could Lead to SSRF Attacks Bitdefender, a provider of cybersecurity solutions, has recently patched a critical vulnerability...
View ArticleADT, Citi Bike, Sun West Mortgage, and Bausch Health Face Alleged Data Breaches
ADT, Citi Bike, Sun West Mortgage, and Bausch Health Face Alleged Data Breaches Several significant data breaches and cyber threats impacting major companies have been detected by the SOCRadar Dark Web...
View ArticleMajor Cyber Attacks in Review: July 2024
Major Cyber Attacks in Review: July 2024 July 2024 has been marked by a series of high-impact cyber attacks, affecting millions of individuals and numerous organizations. Amidst numerous threat...
View ArticleSOCRadar’s Response to the USDoD’s Claim of Scraping 330 Million Emails
SOCRadar’s Response to the USDoD’s Claim of Scraping 320 Million Emails Recently, a threat actor identified as USDoD posted a claim on an online forum, alleging the breach and leak of over 330 million...
View Article5 Supply Chain Intelligence Use Cases with SOCRadar Module
5 Supply Chain Intelligence Use Cases with SOCRadar Module Numerous high-profile incidents have evidenced that cyber threats to the supply chain can have catastrophic consequences. To mitigate these...
View ArticleSOCRadar Recognized in Gartner Report on Digital Risk Protection Services and...
SOCRadar Recognized in Gartner Report on Digital Risk Protection Services and External Attack Surface Management Again In a report published by Gartner on its website on July 29, 2024, SOCRadar was...
View ArticleCritical Vulnerabilities in Progress WhatsUp Gold, Jenkins Could Lead to RCE...
Critical Vulnerabilities in Progress WhatsUp Gold, Jenkins Could Lead to RCE Attacks (CVE-2024-4885, CVE-2024-43044) A critical vulnerability in Progress WhatsUp Gold, recently patched, has been...
View ArticleDark Peep #16: Play Ransomware & LockBit’s Alliance, BreachForums Leak, and...
Dark Peep #16: Play Ransomware & LockBit’s Alliance, BreachForums Leak, and CyberNiggers’ Revival Welcome to Dark Peep #16, where we unravel the freshest and most daring cyber capers. Rumors swirl...
View ArticleUnlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns The cybersecurity landscape constantly evolves, and staying ahead of emerging threats with complicated risks is more...
View ArticleSOCRadar APAC Threat Landscape Report: Gain Insights Into Threats & Trends...
SOCRadar APAC Threat Landscape Report: Gain Insights Into Threats & Trends from the APAC Region Understanding localized cybersecurity issues is more important than ever in a time when cyber threats...
View ArticleAlleged Leaks: Tencent, FTD Educação, and Yellow Pages Data Exposed
Alleged Leaks: Tencent, FTD Educação, and Yellow Pages Data Exposed The SOCRadar Dark Web Team has identified several significant cyber threats in the past week. These include the sale of 21,000 U.S....
View ArticleTop 50 Cloud Statistics in 2024 (Essential Insights on Investments, Breaches,...
Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Breaches, Misconfigurations, and More) In the fast-changing world of cloud computing, it’s essential for both organizations and...
View ArticleDark Web Profile: Cyber Army of Russia Reborn
Dark Web Profile: Cyber Army of Russia Reborn In Russian Народная CyberАрмияa (People’s CyberArmy) is a prominent hacktivist group involved in disruptive attacks on critical infrastructure and...
View ArticleAugust 2024 Patch Tuesday Highlights: 89 CVEs, 6 Zero-Day Vulnerabilities...
August 2024 Patch Tuesday Highlights: 89 CVEs, 6 Zero-Day Vulnerabilities Under Exploitation Microsoft has rolled out the August 2024 Patch Tuesday updates, enhancing its products to address a wide...
View ArticleAnnual Europe Threat Landscape Report 2024
Annual Europe Threat Landscape Report 2024 In an era where cyber threats evolve rapidly, staying ahead of the curve is essential. Our latest Annual Europe Threat Landscape Report 2024 offers a...
View ArticleShedding Light on Indonesia Threat Landscape Report 2024
Shedding Light on Indonesia Threat Landscape Report 2024 In the rapidly evolving digital age, Indonesia, Southeast Asia’s largest economy, has emerged as a focal point for cyber threats. As the country...
View ArticleHackers Claim a Zoom Breach, Alleged FedEx Accounts and Government Logs on Sale
Hackers Claim a Zoom Breach, Alleged FedEx Accounts and Government Logs on Sale Over the past week, the SOCRadar Dark Web Team has uncovered several alarming cyber threats targeting various sectors....
View ArticleWhat is Pretexting? Definition and Examples in Cybersecurity
What is Pretexting? Definition and Examples in Cybersecurity Pretexting is a social engineering tactic in which attackers fabricate a scenario or a “pretext” to trick people into disclosing...
View ArticleIBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of...
IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybersecurity Failures Managing a data breach goes beyond simply addressing the financial impact; it involves tackling a crisis that...
View Article