Showing results for: Changing password

33 results found
May 10, 2023

Ever-Changing Tactics on Social Engineering

In today's digital age, cyber threats are becoming increasingly common, and one of the most prevalent types of attacks is phishing. Phishing involves tricking people into giving away their personal or confidential information by posing… Continue Reading

What is Password Analyzer?
November 11, 2022

What is Password Analyzer?

A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerabilities.  The program verifies the usage of certain sequences of… Continue Reading

January 7, 2021

How Hackers Find Your CEO’s Password and Abuse It

Poor password habits are found everywhere, even in big companies despite the password policies required. The credential leak is one of the most common use cases for a variety of sectors, and enterprises have no… Continue Reading

by
Third-Party Breach Led to Exposure of 9M AT&T Customers’ Information
March 10, 2023

Third-Party Breach Led to Exposure of 9M AT&T Customers’ Information

Recently, AT&T revealed that a data breach in January compromised the personal information of about 9 million of their customers. The breach was caused by a marketing vendor's hack, and as a result, some Customer Proprietary Network Information (CPNI) was accessed.… Continue Reading

What's Next for Cybercrime Ecosystem After Genesis Market Takedown?
April 11, 2023

What’s Next for Cybercrime Ecosystem After Genesis Market Takedown?

One can desire the forbidden, as is the narrative in the Genesis chapter of the Old Testament. In today's digital world, the means of approaching the forbidden are underground markets. One of the most important… Continue Reading

How to Protect Yourself from Cyber Attacks During Tax Season?
March 7, 2023

How to Protect Yourself from Cyber Attacks During Tax Season?

Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman's supervillain Joker will stay out of the way of the IRS. However, the IRS's frightening… Continue Reading

Security Misconfigurations Caused 35% of All Time Cyber Incidents
February 28, 2023

Security Misconfigurations Caused 35% of All Time Cyber Incidents

By SOCRadar Research Security misconfiguration is the vulnerability that arises when systems or applications are not configured properly, resulting in potential security risks. According to OWASP, in 90% of the applications they examined, they found… Continue Reading

Malware Analysis: LummaC2 Stealer
February 9, 2023

Malware Analysis: LummaC2 Stealer

By SOCRadar Research In our article about Stealer-as-a-Service, as the SOCRadar Research team, we looked at Lumma Stealer, a relatively new and unknown malware. During our research, we didn't find much information, so we did threat hunting… Continue Reading

Major Cyberattacks in Review: January 2023
February 7, 2023

Major Cyberattacks in Review: January 2023

Cybersecurity is a constantly changing concern because threats always evolve and adapt to new technology and trends. The first month of 2023 has seen numerous significant cyberattacks that had an impact on people, organizations, and governments all… Continue Reading

PayPal Reveals Credential Stuffing Attack That Affected 35K Users
January 20, 2023

PayPal Reveals Credential Stuffing Attack That Affected 35K Users

PayPal has disclosed that it was hit by a credential stuffing attack last month. The online payment platform notifies all users whose data has been compromised due to the attack.  Hackers carry out credential stuffing attacks using… Continue Reading

Dark Web Profile: Royal Ransomware
January 9, 2023

Dark Web Profile: Royal Ransomware

By SOCRadar Research Ransomware attacks have been rising in recent years, with the frequency of attacks increasing. In 2021, several high-profile ransomware attacks made headlines, such as the attack on the Colonial Pipeline. This attack resulted… Continue Reading

Top 10 Targeted Industries and Countries in 2022
December 23, 2022

Top 10 Targeted Industries and Countries in 2022

No matter the industry, cyberattacks can cause various problems, ranging from minor disruptions to significant losses or, even worse, lawsuits against your organization. Threat actors could target a business in any industry in hopes of… Continue Reading

November 5, 2022

ThreatFusion: Cyber Threat Intelligence

Cyber Threat Intelligence ThreatFusion Get actionable intelligence against cyber threats. No wasting time with irrelevant feeds! ThreatFusion is a part of the SOCRadar Extended Threat Intelligence platform and provides a big-data powered threat investigation module… Continue Reading

November 4, 2022

RiskPrime: Digital Risk Protection

Digital Risk Protection RiskPrime Stay one step ahead of threat actors with actionable intelligence alerts. SOCRadar’s RiskPrime builds on industry-leading instant phishing domain identification, internet-wide scanning, and compromised credential detection technologies by aggregating and correlating… Continue Reading

November 4, 2022

AttackMapper: External Attack Surface Management

Attack Surface Management AttackMapper Gain visibility into your ever-growing attack surface. AttackMapper helps customers gain additional visibility and context regarding the severity of unknown external-facing digital assets in an automated manner. Our external attack surface… Continue Reading

MFA Bypass Techniques: How Does it Work?
October 31, 2022

MFA Bypass Techniques: How Does it Work?

Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various methods, such as brute force to pass this phase unauthorized. Authentication solutions are named… Continue Reading

Recent Attack Types Against Cloud Infrastructures
September 9, 2022

Recent Attack Types Against Cloud Infrastructures

Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading

Major Cyberattacks in Review: July 2022
August 22, 2022

Major Cyberattacks in Review: July 2022 

Today's world has many cyberattack targets, including large organizations, small businesses, and individuals. Any action, no matter how small, can put you in danger. Most of the cyber incidents from last month involved situations in… Continue Reading

Linux Malware RapperBot Brute Forcing SSH Servers
August 8, 2022

Linux Malware RapperBot Brute Forcing SSH Servers

RapperBot is an IoT botnet malware that has spread through brute force since it was first identified in June 2022. Over 3,500 unique IPs were utilized by the RapperBot to brute force into a rising… Continue Reading

What is Domain Hijacking and How to Prevent
July 26, 2022

What is Domain Hijacking and How to Prevent

Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo