Get Your Free Report
Start for Free
Apr 03, 2026
Progress ShareFile Flaws CVE-2026-2699 & CVE-2026-2701 RCE

Progress ShareFile Flaws CVE-2026-2699 & CVE-2026-2701 RCE A newly disclosed Progress ShareFile pre-auth RCE chain is drawing attention after researchers showed how CVE-2026-2699 and CVE-2026-2701...

Learn More
Apr 03, 2026
CVE-2026-20093: Critical Cisco IMC Flaw Allows Unauthenticated Admin A...

CVE-2026-20093: Critical Cisco IMC Flaw Allows Unauthenticated Admin Access to UCS Servers CVE-2026-20093, is an authentication bypass flaw found in the change password functionality of Cisco Integrat...

Learn More
Apr 02, 2026
CVE-2026-5281: Chrome WebGPU Zero-Day Exploited In The Wild

CVE-2026-5281: Chrome WebGPU Zero-Day Exploited In The Wild Google patched CVE-2026-5281, a high-severity use-after-free (CWE-416) vulnerability in Dawn, Chromium’s WebGPU implementation. The company ...

Learn More
Apr 02, 2026
BLACKNET-00: The Ransomware-as-a-Service Platform That Weaponizes Medi...

BLACKNET-00: The Ransomware-as-a-Service Platform That Weaponizes Mediocrity How a Custom Ransomware Builder Collapses the Technical Barrier Between Script Kiddies and Enterprise-Grade Ransomware Oper...

Learn More
Apr 01, 2026
Trivy-Linked Cisco Breach & ShinyHunters’ Stolen Data Claim

Trivy-Linked Cisco Breach & ShinyHunters’ Stolen Data Claim Cisco is facing fresh scrutiny after a breach of its internal development environment was linked to the Trivy supply chain compromise. A...

Learn More
Apr 01, 2026
CVE-2025-53521: F5 BIG-IP APM Flaw Reclassified as Unauthenticated RCE

CVE-2025-53521: F5 BIG-IP APM Flaw Reclassified as Unauthenticated RCE CVE-2025-53521 is a vulnerability in F5 BIG-IP Access Policy Manager (APM) that was initially treated as a denial-of-service cond...

Learn More
Mar 31, 2026
February 2026: ShinyHunters Attacks Hit Odido, CarGurus, Panera Bread,...

February 2026: ShinyHunters Attacks Hit Odido, CarGurus, Panera Bread, and Figure February 2026 brought a fresh wave of data breach disclosures, and the pattern was hard to miss. Extortion-driven atta...

Learn More
Mar 31, 2026
Identity Threat Intelligence Report: How Infostealer Malware Is Reshap...

Identity Threat Intelligence Report: How Infostealer Malware Is Reshaping Cyber Risk? The network edge used to be the thing worth defending. Organizations built their security around it. Then came clo...

Learn More
Mar 31, 2026
Claude Code Leak: What You Need to Know

Claude Code Leak: What You Need to Know [Update] April 1, 2026: “Has Anthropic Confirmed the Cause of the Claude Code Exposure?”, “Claude Code Leak Sparks Typosquatting Attempts” On March 31, 2026, co...

Learn More
Mar 31, 2026
CISA Budget Cuts and the U.S. Cyber Defense Gap in 2026

CISA Budget Cuts and the U.S. Cyber Defense Gap in 2026 CISA entered 2026 under pressure. The agency responsible for helping defend U.S. civilian networks, critical infrastructure, and public-sector o...

Learn More
Mar 31, 2026
Axios npm Hijack 2026: Everything You Need to Know – IOCs, Impact & Re...

Axios npm Hijack 2026: Everything You Need to Know – IOCs, Impact & Remediation On March 31, 2026, a threat actor hijacked the npm account of the lead Axios maintainer and published two malicious ...

Learn More
Mar 30, 2026
Alleged Crypto Leads, Android Spyware, Mossad Leak, Binance Data, Naka...

Alleged Crypto Leads, Android Spyware, Mossad Leak, Binance Data, Nakamura Listing SOCRadar’s Dark Web Team identified several new underground posts this week, including a global “crypto leads” datase...

Learn More
Mar 30, 2026
Inside Handala’s Hack on the FBI Director

Inside Handala’s Hack on the FBI Director The digital battlefield is heating up, and this time, the crosshairs have landed on one of the highest-ranking law enforcement officials in the United States....

Learn More
Mar 27, 2026
Top 10 Cyber Threat Intelligence Trainings

Top 10 Cyber Threat Intelligence Trainings Cybersecurity training has become a core requirement as threat activity grows in scale and complexity. Security teams are expected to understand not only too...

Learn More
Mar 27, 2026
How Are You Blocking Open Source Reconnaissance Tools?

How Are You Blocking Open Source Reconnaissance Tools? Today, a large portion of internet traffic is generated by automated systems that continuously scan and interact with internet-facing infrastruct...

Learn More
Mar 27, 2026
ShadowPrompt: Zero-Click Prompt Injection Chain in Anthropic’s Claude ...

ShadowPrompt: Zero-Click Prompt Injection Chain in Anthropic’s Claude Chrome Extension A vulnerability chain nicknamed ShadowPrompt affected Anthropic’s official Claude Google Chrome extension. Simply...

Learn More
Mar 27, 2026
Understanding Identity and Access Management (IAM)

Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and remote work have become the norm, managing who has access to sensitive data and systems will dete...

Learn More
Mar 26, 2026
How to Detect Brand Impersonation Attacks Early: A Step by Step Monito...

How to Detect Brand Impersonation Attacks Early: A Step by Step Monitoring Guide Brand impersonation rarely starts with a loud signal. It usually begins with a lookalike domain, a copied login page, a...

Learn More
Mar 25, 2026
TeamPCP's Checkmarx GitHub Actions Attack: What You Need to Know

TeamPCP’s Checkmarx GitHub Actions Attack: What You Need to Know A supply chain incident becomes far more dangerous when it stops looking like a single breach and starts behaving like a multiplier. Th...

Learn More
Mar 25, 2026
Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis

Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis Analysis Period: March 17 – 23, 2026 Between March 17 and 23, 2026, SOCRadar identified an extensive coordinated DDoS campaign cond...

Learn More