Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
socprime.com
socprime.com
CVE-2025-24201 Exploitation: Apple Fixes the WebKit Zero-Day Vulnerability Used in Sophisticated Attacks – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hot on the heels of the exploitation attempts of the...
socprime.com
CVE-2025-27840: Vulnerability Exploitation in Espressif ESP32 Bluetooth Chips Can Lead to Unauthorized Access to Devices – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Following the disclosure of an authorization bypass vulnerability in the...
socprime.com
SOC Prime Announces Referral Program for Individual Cyber Defenders – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Invite Your Peers, Get 20% Off SOC Prime Platform Solo...
socprime.com
Uncoder: Private Non-Agentic AI for Threat-Informed Detection Engineering – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko SOC Prime is excited to announce a major upgrade to...
socprime.com
Detect Hellсat Ransomware Attacks: New Ransomware-as-a-Service Threat Group Targeting а Variety of High-Profile Organizations Globally – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Ransomware remains a top cybersecurity threat, with attack costs soaring...
socprime.com
CVE-2025-25730 Vulnerability: Authorization Bypass in Motorola Mobility Droid Razr HD (Model XT926) – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hot on the heels of the disclosure of CVE-2025-1001, a...
socprime.com
CVE-2025-1001 Vulnerability in Medixant RadiAnt DICOM Viewer Enables Threat Actors to Perform Machine-in-the-Middle Attacks – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk A new day, a new menace for cyber defenders. A...
socprime.com
UAC-0173 Activity Detection: Hackers Launch Phishing Attacks Against Ukrainian Notaries Using the DARKCRYSTALRAT Malware – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Following the investigation into UAC-0212’s increasing activity against multiple organizations...
socprime.com
CVE-2025–27364 in MITRE Caldera: Exploitation of a New Max-Severity RCE Vulnerability via Linker Flag Manipulation Can Lead to Full System Compromise – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko A novel max-severity RCE vulnerability (CVE-2025-27364) in MITRE Caldera poses...
socprime.com
UAC-0212 Attack Detection: Hackers Linked to UAC-0002 aka Sandworm APT Subcluster Launch Targeted Attacks Against the Ukrainian Critical Infrastructure – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko In Q1 2024, defenders uncovered destructive cyberattacks against the information...
socprime.com
CVE-2025-20059: Relative Path Traversal Vulnerability in Ping Identity PingAM Java Policy Agent – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hard on the heels of the recent disclosure of CVE-2025-0108...
socprime.com
CVE-2025-0108 Detection: Active Exploitation of an Authentication Bypass Palo Alto Networks PAN-OS Software – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk A recently patched firewall flaw in Palo Alto Networks PAN-OS,...
socprime.com
Ghost (Cring) Ransomware Detection: The FBI, CISA, and Partners Warn of Increasing China-Backed Group’s Attacks for Financial Gain – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Increasing ransomware volumes, expanding hacker collectives, and record-breaking damage costs...
socprime.com
CVE-2025-26465 & CVE-2025-26466 Vulnerabilities Expose Systems to Man-in-the-Middle and DoS Attacks – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Two newly uncovered security flaws in the open-source OpenSSH suite...
socprime.com
CVE-2025-1094 Exploitation, a Critical SQL Injection Vulnerability in PostgreSQL That Can Lead to Arbitrary Code Execution – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko A novel PostgreSQL flaw, CVE-2025-1094, has hit the headlines. Defenders...
socprime.com
RedCurl/EarthKapre APT Attack Detection: A Sophisticated Cyber-Espionage Group Uses a Legitimate Adobe Executable to Deploy a Loader – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The nefarious cyber-espionage hacking collective tracked as EarthKapre or RedCurl...
socprime.com
Sandworm APT Attacks Detection: russian State-Sponsored Hackers Deploy Malicious Windows KMS Activators to Target Ukraine – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk For over a decade, russia-backed Sandworm APT group (also tracked...
socprime.com
XE Group Activity Detection: From Credit Card Skimming to Exploiting CVE-2024-57968 and CVE-2025-25181 VeraCore Zero-Day Vulnerabilities – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko XE Group, likely a Vietnam-linked hacking collective that has been...
socprime.com
CVE-2025-0411 Detection: russian Cybercrime Groups Rely on Zero-Day Vulnerability in 7-Zip to Target Ukrainian Organizations – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Since a full-scale invasion of Ukraine, cybercriminal groups of russian...
socprime.com
CVE-2025-21293 Detection: PoC Exploit Released for a Privilege Escalation Vulnerability in Active Directory Domain Services – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Shortly after the critical zero-click OLE vulnerability in Microsoft Outlook (CVE-2025-21298),...
socprime.com
Lumma Stealer Detection: Sophisticated Campaign Using GitHub Infrastructure to Spread SectopRAT, Vidar, Cobeacon, and Other Types of Malware – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Lumma Stealer, nefarious info-stealing malware, resurfaces in the cyber threat...
socprime.com
TorNet Backdoor Detection: An Ongoing Phishing Email Campaign Uses PureCrypter Malware to Drop Other Payloads – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Financially motivated hackers are behind an ongoing malicious campaign targeting...
socprime.com
CVE-2024-8963, CVE-2024-9379, CVE-2024-8190, and CVE-2024-9380 Detection: CISA and FBI Warn Defenders of Two Exploit Chains Using Critical Ivanti CSA Vulnerabilities – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Defenders shed light on a set of vulnerabilities in Ivanti...
socprime.com
CVE-2025-21298 Detection: Critical Zero-Click OLE Vulnerability in Microsoft Outlook Results in Remote Code Execution – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Hard on the heels of the disclosure of a denial-of-service...
socprime.com
Hackers Exploit AnyDesk Impersonating CERT-UA to Launch Cyber-Attacks – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Adversaries frequently leverage legitimate tools in their malicious campaigns. The...
socprime.com
CVE-2024-49113 Detection: Windows LDAP Denial-of-Service Vulnerability aka LDAPNightmare Exploited via a Publicly Available PoC – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hot on the heels of the release of the first...
socprime.com
SOC Prime Threat Bounty Digest — December 2024 Results – Source: socprime.com
Source: socprime.com - Author: Alla Yurchenko Detection Content Creation, Submission & Release December was another impressive...
socprime.com
CVE-2024-55591 Detection: Critical Zero-Day Vulnerability in Fortinet FortiOS and FortiProxy Actively Exploited in the Wild – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk This week, over 700 new vulnerabilities have been identified, continuing...
socprime.com
Detect Banshee Stealer: Stealthy Apple macOS Malware Evades Detection Using XProtect Encryption – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk New year, new menaces for cyber defenders. Cybersecurity researchers have...
socprime.com
SOC Prime Launches Uncoder AI Solo: New Subscription Plan for Individual Security Experts – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk SOC Prime announces the launch of Uncoder AI Solo, a...
Posts pagination
1
…
5
6
7
…
11
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025