Progress ShareFile Flaws CVE-2026-2699 & CVE-2026-2701 RCE
Progress ShareFile Flaws CVE-2026-2699 & CVE-2026-2701 RCE A newly disclosed Progress ShareFile pre-auth RCE chain is drawing attention after researchers showed how CVE-2026-2699 and CVE-2026-2701...
CVE-2026-20093: Critical Cisco IMC Flaw Allows Unauthenticated Admin A...
CVE-2026-20093: Critical Cisco IMC Flaw Allows Unauthenticated Admin Access to UCS Servers CVE-2026-20093, is an authentication bypass flaw found in the change password functionality of Cisco Integrat...
CVE-2026-5281: Chrome WebGPU Zero-Day Exploited In The Wild
CVE-2026-5281: Chrome WebGPU Zero-Day Exploited In The Wild Google patched CVE-2026-5281, a high-severity use-after-free (CWE-416) vulnerability in Dawn, Chromium’s WebGPU implementation. The company ...
BLACKNET-00: The Ransomware-as-a-Service Platform That Weaponizes Medi...
BLACKNET-00: The Ransomware-as-a-Service Platform That Weaponizes Mediocrity How a Custom Ransomware Builder Collapses the Technical Barrier Between Script Kiddies and Enterprise-Grade Ransomware Oper...
Trivy-Linked Cisco Breach & ShinyHunters’ Stolen Data Claim
Trivy-Linked Cisco Breach & ShinyHunters’ Stolen Data Claim Cisco is facing fresh scrutiny after a breach of its internal development environment was linked to the Trivy supply chain compromise. A...
CVE-2025-53521: F5 BIG-IP APM Flaw Reclassified as Unauthenticated RCE
CVE-2025-53521: F5 BIG-IP APM Flaw Reclassified as Unauthenticated RCE CVE-2025-53521 is a vulnerability in F5 BIG-IP Access Policy Manager (APM) that was initially treated as a denial-of-service cond...
February 2026: ShinyHunters Attacks Hit Odido, CarGurus, Panera Bread,...
February 2026: ShinyHunters Attacks Hit Odido, CarGurus, Panera Bread, and Figure February 2026 brought a fresh wave of data breach disclosures, and the pattern was hard to miss. Extortion-driven atta...
Identity Threat Intelligence Report: How Infostealer Malware Is Reshap...
Identity Threat Intelligence Report: How Infostealer Malware Is Reshaping Cyber Risk? The network edge used to be the thing worth defending. Organizations built their security around it. Then came clo...
Claude Code Leak: What You Need to Know
Claude Code Leak: What You Need to Know [Update] April 1, 2026: “Has Anthropic Confirmed the Cause of the Claude Code Exposure?”, “Claude Code Leak Sparks Typosquatting Attempts” On March 31, 2026, co...
CISA Budget Cuts and the U.S. Cyber Defense Gap in 2026
CISA Budget Cuts and the U.S. Cyber Defense Gap in 2026 CISA entered 2026 under pressure. The agency responsible for helping defend U.S. civilian networks, critical infrastructure, and public-sector o...
Axios npm Hijack 2026: Everything You Need to Know – IOCs, Impact & Re...
Axios npm Hijack 2026: Everything You Need to Know – IOCs, Impact & Remediation On March 31, 2026, a threat actor hijacked the npm account of the lead Axios maintainer and published two malicious ...
Alleged Crypto Leads, Android Spyware, Mossad Leak, Binance Data, Naka...
Alleged Crypto Leads, Android Spyware, Mossad Leak, Binance Data, Nakamura Listing SOCRadar’s Dark Web Team identified several new underground posts this week, including a global “crypto leads” datase...
Inside Handala’s Hack on the FBI Director
Inside Handala’s Hack on the FBI Director The digital battlefield is heating up, and this time, the crosshairs have landed on one of the highest-ranking law enforcement officials in the United States....
Top 10 Cyber Threat Intelligence Trainings
Top 10 Cyber Threat Intelligence Trainings Cybersecurity training has become a core requirement as threat activity grows in scale and complexity. Security teams are expected to understand not only too...
How Are You Blocking Open Source Reconnaissance Tools?
How Are You Blocking Open Source Reconnaissance Tools? Today, a large portion of internet traffic is generated by automated systems that continuously scan and interact with internet-facing infrastruct...
ShadowPrompt: Zero-Click Prompt Injection Chain in Anthropic’s Claude ...
ShadowPrompt: Zero-Click Prompt Injection Chain in Anthropic’s Claude Chrome Extension A vulnerability chain nicknamed ShadowPrompt affected Anthropic’s official Claude Google Chrome extension. Simply...
Understanding Identity and Access Management (IAM)
Understanding Identity and Access Management (IAM) In a world where digital tools, cloud services, and remote work have become the norm, managing who has access to sensitive data and systems will dete...
How to Detect Brand Impersonation Attacks Early: A Step by Step Monito...
How to Detect Brand Impersonation Attacks Early: A Step by Step Monitoring Guide Brand impersonation rarely starts with a loud signal. It usually begins with a lookalike domain, a copied login page, a...
TeamPCP's Checkmarx GitHub Actions Attack: What You Need to Know
TeamPCP’s Checkmarx GitHub Actions Attack: What You Need to Know A supply chain incident becomes far more dangerous when it stops looking like a single breach and starts behaving like a multiplier. Th...
Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis
Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis Analysis Period: March 17 – 23, 2026 Between March 17 and 23, 2026, SOCRadar identified an extensive coordinated DDoS campaign cond...