In today's digital age, cyber threats are becoming increasingly common, and one of the most prevalent types of attacks is phishing. Phishing involves tricking people into giving away their personal or confidential information by posing… Continue Reading
A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerabilities. The program verifies the usage of certain sequences of… Continue Reading
Poor password habits are found everywhere, even in big companies despite the password policies required. The credential leak is one of the most common use cases for a variety of sectors, and enterprises have no… Continue Reading
Recently, AT&T revealed that a data breach in January compromised the personal information of about 9 million of their customers. The breach was caused by a marketing vendor's hack, and as a result, some Customer Proprietary Network Information (CPNI) was accessed.… Continue Reading
One can desire the forbidden, as is the narrative in the Genesis chapter of the Old Testament. In today's digital world, the means of approaching the forbidden are underground markets. One of the most important… Continue Reading
Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman's supervillain Joker will stay out of the way of the IRS. However, the IRS's frightening… Continue Reading
By SOCRadar Research Security misconfiguration is the vulnerability that arises when systems or applications are not configured properly, resulting in potential security risks. According to OWASP, in 90% of the applications they examined, they found… Continue Reading
By SOCRadar Research In our article about Stealer-as-a-Service, as the SOCRadar Research team, we looked at Lumma Stealer, a relatively new and unknown malware. During our research, we didn't find much information, so we did threat hunting… Continue Reading
Cybersecurity is a constantly changing concern because threats always evolve and adapt to new technology and trends. The first month of 2023 has seen numerous significant cyberattacks that had an impact on people, organizations, and governments all… Continue Reading
PayPal has disclosed that it was hit by a credential stuffing attack last month. The online payment platform notifies all users whose data has been compromised due to the attack. Hackers carry out credential stuffing attacks using… Continue Reading
By SOCRadar Research Ransomware attacks have been rising in recent years, with the frequency of attacks increasing. In 2021, several high-profile ransomware attacks made headlines, such as the attack on the Colonial Pipeline. This attack resulted… Continue Reading
No matter the industry, cyberattacks can cause various problems, ranging from minor disruptions to significant losses or, even worse, lawsuits against your organization. Threat actors could target a business in any industry in hopes of… Continue Reading
Cyber Threat Intelligence ThreatFusion Get actionable intelligence against cyber threats. No wasting time with irrelevant feeds! ThreatFusion is a part of the SOCRadar Extended Threat Intelligence platform and provides a big-data powered threat investigation module… Continue Reading
Digital Risk Protection RiskPrime Stay one step ahead of threat actors with actionable intelligence alerts. SOCRadar’s RiskPrime builds on industry-leading instant phishing domain identification, internet-wide scanning, and compromised credential detection technologies by aggregating and correlating… Continue Reading
Attack Surface Management AttackMapper Gain visibility into your ever-growing attack surface. AttackMapper helps customers gain additional visibility and context regarding the severity of unknown external-facing digital assets in an automated manner. Our external attack surface… Continue Reading
Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various methods, such as brute force to pass this phase unauthorized. Authentication solutions are named… Continue Reading
Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading
Today's world has many cyberattack targets, including large organizations, small businesses, and individuals. Any action, no matter how small, can put you in danger. Most of the cyber incidents from last month involved situations in… Continue Reading
RapperBot is an IoT botnet malware that has spread through brute force since it was first identified in June 2022. Over 3,500 unique IPs were utilized by the RapperBot to brute force into a rising… Continue Reading
Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading