Apr 10, 2024
Microsoft’s April 2024 Patch Tuesday, 149 Vulnerabilities Patched, Inc...

Microsoft’s April 2024 Patch Tuesday, 149 Vulnerabilities Patched, including 2 Zero-Day Vulnerabilities Microsoft’s April 2024 Patch Tuesday was a substantial release addressing a total of 149 securit...

Learn More
Apr 10, 2024
How to Monitor Your Supply Chain’s Dark Web Activities?

How to Monitor Your Supply Chain’s Dark Web Activities? As organizations rely on complex networks of suppliers and vendors to deliver goods and services, ensuring the integrity and resilience of these...

Learn More
Apr 10, 2024
Top 10 CTI Blogs You Need to Follow

Top 10 CTI Blogs You Need to Follow CTI blogs play an important role in keeping security professionals up to date on the latest threats, trends, and defensive strategies, providing in-depth analysis, ...

Learn More
Apr 09, 2024
Top 10 Threat Intelligence Podcasts

Top 10 Threat Intelligence Podcasts Podcasts provide an easy and effective way to stay up to date on the threat intelligence landscape. They cover a wide range of topics, including insights into the m...

Learn More
Apr 08, 2024
Latest Dark Web Sales: Exploits, 0-Days, Financial & Government Data L...

Latest Dark Web Sales: Exploits, 0-Days, Financial & Government Data Leaks, DarkVR Service The SOCRadar Dark Web Team’s recent discoveries reveal a range of concerning cyber threats. These include...

Learn More
Apr 08, 2024
Cybersecurity Risks During 2024 Indian General Elections

Cybersecurity Risks During 2024 Indian General Elections General elections in India will be held from April 19 to June 1, 2024. In the context of election security in cyberspace, a couple of points ca...

Learn More
Apr 08, 2024
Dark Web Profile: Mallox Ransomware

Dark Web Profile: Mallox Ransomware Mallox, a strain of ransomware and a group with the same name, encrypts its victims’ data and subsequently demands a ransom, typically in cryptocurrency, in return ...

Learn More
Apr 05, 2024
CISA Adds SOCRadar Labs to its Resources & Tools

CISA Adds SOCRadar Labs to its Resources & Tools In a significant move to bolster cybersecurity resilience, the Cybersecurity and Infrastructure Security Agency (CISA) has officially included SOC...

Learn More
Apr 05, 2024
Dark Web Profile: DonutLeaks

Dark Web Profile: DonutLeaks In 2022, the DonutLeaks group emerged as a significant player, demonstrating a sophisticated approach to data extortion. Linked to cyber incidents targeting notable enterp...

Learn More
Apr 05, 2024
Cybersecurity Challenges in 2024 United Kingdom’s Elections

Cybersecurity Challenges in 2024 United Kingdom’s Elections Cybersecurity challenges are expected to play a significant role in the upcoming United Kingdom elections in 2024. As the world becomes more...

Learn More
Apr 04, 2024
Ivanti Connect Secure and Policy Secure Gateways Vulnerable to DoS and...

Ivanti Connect Secure and Policy Secure Gateways Vulnerable to DoS and Code Execution (CVE-2024-21894) Ivanti recently released patches to fix multiple vulnerabilities found in their popular Connect S...

Learn More
Apr 04, 2024
Shedding Light on the Ancient Continent: Insights from Southern Africa

Shedding Light on the Ancient Continent: Insights from Southern Africa Today’s online world is full of risks. Our report on cyber threats in Southern Africa is key for anyone wanting to protect their...

Learn More
Apr 04, 2024
Google's Response to Pixel Zero-Days: CVE-2024-29745, CVE-2024-29748; ...

Google’s Response to Pixel Zero-Days: CVE-2024-29745, CVE-2024-29748; Chrome V8 Zero-Day, CVE-2024-3159 [Update] April 5, 2024: “CISA Urges Immediate Action on Pixel Zero-Day Vulnerabilities”  Google ...

Learn More
Apr 03, 2024
Critical OS Command Injection Flaw in Progress Flowmon: CVE-2024-2389

Critical OS Command Injection Flaw in Progress Flowmon: CVE-2024-2389 Progress disclosed a highly critical vulnerability, CVE-2024-2389, that affects the Flowmon product. Exploiting this vulnerability...

Learn More
Apr 02, 2024
The Anatomy of Stealers: How Are They Stealing Our Information? Where ...

The Anatomy of Stealers: How Are They Stealing Our Information? Where Are They Taking It? The world of cyber security faces new and more complex threats every day. Among these threats, which we encoun...

Learn More
Apr 01, 2024
How to Detect & Prevent Ransomware Attacks (2024 CISO Edition)

How to Detect & Prevent Ransomware Attacks (2024 CISO Edition) ...

Learn More
Apr 01, 2024
What Do You Need to Know About the Linux XZ Utils Vulnerability, CVE-2...

What Do You Need to Know About the Linux XZ Utils Vulnerability, CVE-2024-3094? A researcher has identified a critical vulnerability in Linux’s XZ Utils, a command line tool for XZ format compression....

Learn More
Apr 01, 2024
U.S. Faces Cyber Onslaught: Fico Breach, ID, CC, Military Data Sale

U.S. Faces Cyber Onslaught: Fico Breach, ID, CC, Military Data Sale Explore the latest dark web threats uncovered by SOCRadar’s Dark Web Team. From breaches affecting major corporations such as Fico t...

Learn More
Apr 01, 2024
Top 10 Cybersecurity Books

Top 10 Cybersecurity Books With new threats and challenges emerging every day within the cybersecurity field, to stay ahead of the curve, it’s necessary to keep learning. One of the best ways to do th...

Learn More
Apr 01, 2024
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists

Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists Newbie penetration testers often struggle to grasp the significance of the initial findings reported by most Dynamic Application Scann...

Learn More