soc

📅 Kalender

< May 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
12345678
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.  CVE-2026-41940 WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of […]

Mehr lesen →
soc

Chinese Cybercrime Infrastructure Detected: Automated Exploitation & Harvesting Infrastructure

Chinese Cybercrime Infrastructure Detected: Automated Exploitation & Harvesting Infrastructure SOCRadar Threat Research Team identified automated Chinese cybercrime infrastructure that blends large-scale exploitation with structured orchestration and monetization. The operation is coordinated through a centralized backend (referred to as ‘paperclip‘) and an agent-based workflow system OpenClaw, enabling operators to manage campaigns through structured missions. The system […]

Mehr lesen →
soc

SAP Ecosystem Targeted: The Mini Shai-Hulud Supply Chain Attack

SAP Ecosystem Targeted: The Mini Shai-Hulud Supply Chain Attack A sophisticated npm supply-chain compromise dubbed “Mini Shai-Hulud” has recently emerged, creating an urgent risk for SAP CAP development teams and CI/CD environments. Threat actors leverage trusted packages to deliver an 11.7 MB credential stealer and self-propagating framework. Instead of simply disrupting services, this malware silently […]

Mehr lesen →
soc

25 Best SOC Tools: AI-Powered & Automated Security Guide

25 Best SOC Tools: AI-Powered & Automated Security Guide Running a Security Operations Center (SOC) means drowning in tools, not lacking them. The harder problem is finding the right ones, deployed in the right combination, with enough integration to actually work together under pressure. This guide cuts through the noise. Below are 25 of the […]

Mehr lesen →
soc

What Is Dark Web Monitoring?

What Is Dark Web Monitoring? Every day, stolen credentials, leaked records, and sensitive data show up in hidden corners of the internet. Most security tools never reach those places. Dark Web Monitoring does. In this guide, you will learn the Dark Web Monitoring meaning, how it works, the risks it detects, and why it is […]

Mehr lesen →