Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
socprime.com
socprime.com
CVE-2025-0108 Detection: Active Exploitation of an Authentication Bypass Palo Alto Networks PAN-OS Software – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk A recently patched firewall flaw in Palo Alto Networks PAN-OS,...
socprime.com
Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Increasing ransomware volumes, expanding hacker collectives, and record-breaking damage costs...
socprime.com
CVE-2025-26465 & CVE-2025-26466 Vulnerabilities Expose Systems to Man-in-the-Middle and DoS Attacks – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Two newly uncovered security flaws in the open-source OpenSSH suite...
socprime.com
CVE-2025-1094 Exploitation, a Critical SQL Injection Vulnerability in PostgreSQL That Can Lead to Arbitrary Code Execution – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko A novel PostgreSQL flaw, CVE-2025-1094, has hit the headlines. Defenders...
socprime.com
RedCurl/EarthKapre APT Attack Detection: A Sophisticated Cyber-Espionage Group Uses a Legitimate Adobe Executable to Deploy a Loader – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The nefarious cyber-espionage hacking collective tracked as EarthKapre or RedCurl...
socprime.com
Sandworm APT Attacks Detection: russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk For over a decade, russia-backed Sandworm APT group (also tracked...
socprime.com
XE Group Activity Detection: From Credit Card Skimming to Exploiting CVE-2024-57968 and CVE-2025-25181 VeraCore Zero-Day Vulnerabilities – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko XE Group, likely a Vietnam-linked hacking collective that has been...
socprime.com
CVE-2025-0411 Detection: russian Cybercrime Groups Rely on Zero-Day Vulnerability in 7-Zip to Target Ukrainian Organizations – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Since a full-scale invasion of Ukraine, cybercriminal groups of russian...
socprime.com
CVE-2025-21293 Detection: PoC Exploit Released for a Privilege Escalation Vulnerability in Active Directory Domain Services – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Shortly after the critical zero-click OLE vulnerability in Microsoft Outlook (CVE-2025-21298),...
socprime.com
Lumma Stealer Detection: Sophisticated Campaign Using GitHub Infrastructure to Spread SectopRAT, Vidar, Cobeacon, and Other Types of Malware – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Lumma Stealer, nefarious info-stealing malware, resurfaces in the cyber threat...
socprime.com
TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Financially motivated hackers are behind an ongoing malicious campaign targeting...
socprime.com
CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380 Detection: CISA and FBI Warn Defenders of Two Exploit Chains Using Critical Ivanti CSA Vulnerabilities – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Defenders shed light on a set of vulnerabilities in Ivanti...
socprime.com
CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Hard on the heels of the disclosure of a denial-of-service...
socprime.com
Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Adversaries frequently leverage legitimate tools in their malicious campaigns. The...
socprime.com
CVE-2024-49113 Detection: Windows LDAP Denial-of-Service Vulnerability aka LDAPNightmare Exploited via a Publicly Available PoC – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hot on the heels of the release of the first...
socprime.com
SOC Prime Threat Bounty Digest — December 2024 Results – Source: socprime.com
Source: socprime.com - Author: Alla Yurchenko Detection Content Creation, Submission & Release December was another impressive...
socprime.com
CVE-2024-55591 Detection: Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk This week, over 700 new vulnerabilities have been identified, continuing...
socprime.com
Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk New year, new menaces for cyber defenders. Cybersecurity researchers have...
socprime.com
SOC Prime Launches Uncoder AI Solo: New Subscription Plan for Individual Security Experts – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk SOC Prime announces the launch of Uncoder AI Solo, a...
socprime.com
EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Hot on the heels of the re-emergence of a more...
socprime.com
Message Queues vs. Streaming Systems: Key Differences and Use Cases – Source: socprime.com
Source: socprime.com - Author: Oleksii K. In the world of data processing and messaging systems, terms...
socprime.com
What is Event Streaming in Apache Kafka? – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] January 06, 2025...
socprime.com
NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The modern-day cyber threat landscape is marked by the rise...
socprime.com
Elasticsearch: Cluster Status is RED – Source: socprime.com
Source: socprime.com - Author: Oleksandr L It happens very rarely, but sometimes your cluster gets red...
socprime.com
Search and Replace Text in SPL Fields with rex – Source: socprime.com
Source: socprime.com - Author: John Stevens [post-views] January 02, 2025 · 1 min read Sometimes when...
socprime.com
CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk In 2024, vulnerability exploitation accounted for 14% of breach entry...
socprime.com
rare Сommand in Splunk – Source: socprime.com
Source: socprime.com - Author: Justin Erb The rare command in Splunk helps you find the least common values...
socprime.com
coalesce Function in Splunk – Source: socprime.com
Source: socprime.com - Author: Justin Erb WRITTEN BY Justin Erb Threat Hunter [post-views] December 30, 2024...
socprime.com
Strela Stealer Attack Detection: New Malware Variant Now Targets Ukraine Alongside Spain, Italy, and Germany – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Security experts have uncovered a novel Strela Stealer campaign, which...
socprime.com
Reducing Kafka Lag: Optimizing Kafka Performance – Source: socprime.com
Source: socprime.com - Author: Oleksii K. Apache Kafka is a powerful distributed messaging system, but like...
Posts navigation
1
2
…
5
Latest News
The Hacker News
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives – Source:thehackernews.com
20/02/2025
The Hacker News
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now – Source:thehackernews.com
20/02/2025
The Hacker News
Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability – Source:thehackernews.com
20/02/2025
The Hacker News
Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability – Source:thehackernews.com
20/02/2025
securelist.com
Managed detection and response in 2024 – Source: securelist.com
20/02/2025
CSO - Online
Hackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen – Source: www.csoonline.com
20/02/2025