Operation AkaiRyū Attacks Detection: MirrorFace China-Backed APT Group Targets Central European Diplomatic Institute Using ANEL Backdoor Threats According to ESET APT Activity Report Q2 2024-Q3 2024, China-linked… rooter March 19, 2025 5 min read 0
UAC-0200 Attack Detection: Cyber-Espionage Activity Targeting Defense Industry Sector and the Armed Forces of Ukraine Using DarkCrystal RAT Threats The UAC-0200 hacking group resurfaces in the cyber threat arena.… rooter March 19, 2025 4 min read 0
Medusa Ransomware Detection: The FBI, CISA & Partners Warn of Increasing Attacks by Ransomware Developers and Affiliates Against Critical Infrastructure Threats According to Sophos, ransomware recovery costs soared to $2.73 million… rooter March 13, 2025 5 min read 0
CVE-2025-24201 Exploitation: Apple Fixes the WebKit Zero-Day Vulnerability Used in Sophisticated Attacks Threats Hot on the heels of the exploitation attempts of the… rooter March 12, 2025 3 min read 0
CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices Threats Following the disclosure of an authorization bypass vulnerability in the… rooter March 11, 2025 4 min read 0
SOC Prime Announces Referral Program for Individual Cyber Defenders Threats Invite Your Peers, Get 20% Off SOC Prime Platform Solo… rooter March 11, 2025 3 min read 0
Uncoder: Private Non-Agentic AI for Threat-Informed Detection Engineering Threats SOC Prime is excited to announce a major upgrade to… rooter March 6, 2025 8 min read 0
Detect Hellсat Ransomware Attacks: New Ransomware-as-a-Service Threat Group Targeting а Variety of High-Profile Organizations Globally Threats Ransomware remains a top cybersecurity threat, with attack costs soaring… rooter March 4, 2025 5 min read 0
CVE-2025-25730 Vulnerability: Authorization Bypass in Motorola Mobility Droid Razr HD (Model XT926) Threats Hot on the heels of the disclosure of CVE-2025-1001, a… rooter February 28, 2025 3 min read 0
CVE-2025-1001 Vulnerability in Medixant RadiAnt DICOM Viewer Enables Threat Actors to Perform Machine-in-the-Middle Attacks Threats A new day, a new menace for cyber defenders. A… rooter February 26, 2025 3 min read 0