Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
socprime.com
socprime.com
The Gentlemen Ransomware Detection: New Adversary Campaign Abuses Group Policies and Uses Advanced Tools to Target Critical Organizations – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hot on the heels of the newly identified BQTLOCK ransomware...
socprime.com
MostereRAT Detection: Attackers Abuse AnyDesk and TightVNC for Persistent Access on Windows Systems – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Phishing is widely recognized as a prevalent method of executing...
socprime.com
Lazarus Group Attack Detection: Hackers Expand Their Toolkit with PondRAT, ThemeForestRAT, and RemotePE Malware Strains – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk The Lazarus Group, a notorious North Korea-backed hacking collective also...
socprime.com
What’s New in Active Threats: Threat of the Month, New AI Search, and Improved Performance – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk SOC Prime’s latest release advances AI-native cybersecurity workflows with milestone...
socprime.com
What’s New in Uncoder: AI Chat Bot & MCP Tools – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk SOC Prime’s latest release is focused on improving AI-native cybersecurity...
socprime.com
CVE-2025-55177: Vulnerability in WhatsApp iOS & macOS Messaging Clients Exploited for Zero-Click Attacks – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk In late August, Apple rushed out an emergency update to...
socprime.com
CVE-2025-7775 Vulnerability: A New Critical NetScaler RCE Zero-Day Under Active Exploitation – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Hot on the heels of the disclosure of CVE-2025-43300, a...
socprime.com
UNC6384 Attack Detection: China-Linked Group Targets Diplomats and Hijacks Web Traffic Spreading a PlugX Variant – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The China-backed hacking collective tracked as UNC6384 has been observed...
socprime.com
BQTLOCK Ransomware Detection: New RaaS Operators Employ Advanced Detection Evasion Techniques – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Ransomware-as-a-Service (RaaS), promoted on dark web forums and popular messaging...
socprime.com
CVE-2025-43300 Vulnerability: Zero-Day in iOS, iPadOS, and macOS Under Active Exploitation – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko As the season shifts from summer to fall, the cyber...
socprime.com
CVE-2025-9074: Critical Vulnerability in Docker Desktop Enables Local Container Access to Docker Engine API via Subnet – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Docker is one of the backbones of modern enterprise infrastructure,...
socprime.com
Crypto24 Ransomware Detection: Hackers Hit Large Organizations via Legitimate Tools and Custom Malware to Stay Under the Radar – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Ransomware continues to rank among the most critical cyber threats....
socprime.com
CVE-2025-8088 Detection: WinRAR Zero-Day Is Actively Exploited in the Wild to Install RomCom Malware – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk As summer reaches its peak, the cyber threat landscape is...
socprime.com
UAC-0099 Attack Detection: Hackers Target Government and Defense Agencies in Ukraine Using MATCHBOIL, MATCHWOK, and DRAGSTARE Malware – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The UAC-0099 hacking collective, active in cyber-espionage campaigns against Ukraine...
socprime.com
Secret Blizzard Attack Detection: russia-Backed APT Targets Foreign Embassies in Moscow With ApolloShadow Malware – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk russia-affiliated hacking groups remain a major global threat, continuously adapting...
socprime.com
CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk After Microsoft’s recent patch for two critical zero-day vulnerabilities in...
socprime.com
Koske Malware Detection: New AI-Generated Linux Threat in the Wild – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Attackers are increasingly leveraging AI to compromise critical business assets,...
socprime.com
Epsilon Red Ransomware Detection: New Adversary Campaign Targeting Users Globally via ClickFix – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Following closely after the Interlock ransomware attacks that used a...
socprime.com
Interlock Ransomware Detection: The FBI, CISA, and Partners Issue Joint Alert on Massive Attacks via the ClickFix Social Engineering Technique – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko In mid-July 2025, researchers spread the news of the reemergence...
socprime.com
CVE-2025-53770 Detection: Microsoft SharePoint Zero-Day Vulnerability Is Actively Exploited for RCE Attacks – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk This summer saw a surge of critical vulnerabilities impacting Microsoft...
socprime.com
UAC-0001 (APT28) Attack Detection: The russia-Backed Actor Uses LLM-Powered LAMEHUG Malware to Target Security and Defense Sector – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The notorious russian state-sponsored threat group UAC-0001 (also tracked as...
socprime.com
CVE-2025-6558 Vulnerability: Google Chrome Zero-Day Under Active Exploitation – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk As the summer heat continues to climb, so does the...
socprime.com
Interlock Ransomware Detection: Adversaries Deploy a Novel PHP-Based RAT Variant via FileFix – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Threat actors operating the Interlock ransomware, known for executing high-impact...
socprime.com
CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Following the recent disclosure of CVE-2025-47981, a critical heap-based buffer...
socprime.com
CVE-2025-47981: Critical Heap-Based Buffer Overflow Vulnerability in Windows SPNEGO Extended Negotiation Leads to RCE – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk With over 1.4 billion devices running Windows and widespread adoption...
socprime.com
BERT Ransomware Group Activity Detection: Attacks Across Asia, Europe, and the U.S. Targeting Windows and Linux Platforms – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The 2025 Verizon Data Breach Investigations Report (DBIR) underscores that...
socprime.com
CVE-2025-32463 and CVE-2025-32462 Detection: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko WRITTEN BY Veronika Telychko Technical Writer [post-views] July 02, 2025...
socprime.com
CVE-2025-5777 Detection: A New Critical Vulnerability Dubbed “CitrixBleed 2” in NetScaler ADC Faces Exploitation Risk – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Shortly after the disclosure of two Sudo-related local privilege escalation...
socprime.com
CVE-2025-32463 and CVE-2025-32462: Sudo Local Privilege Escalation Vulnerabilities Threaten Linux Environments – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Following the disclosure of two local privilege escalation (LPE) vulnerabilities,...
socprime.com
SOC Prime and Anetac – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Announce Partnership to Optimize Identity Security and Combat Identity-Based Enterprise...
Posts pagination
1
2
…
11
Latest News
CSO - Online
Managed SOC für mehr Sicherheit – Source: www.csoonline.com
11/09/2025
CSO - Online
Menschenzentrierte Cybersicherheit gewinnt an Bedeutung – Source: www.csoonline.com
11/09/2025
The Hacker News
Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity – Source:thehackernews.com
11/09/2025
The Hacker News
Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence – Source:thehackernews.com
11/09/2025
The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers – Source:thehackernews.com
11/09/2025
The Hacker News
Cracking the Boardroom Code: Helping CISOs Speak the Language of Business – Source:thehackernews.com
11/09/2025