Blog

Latest articles from SOCRadar

May 16, 2022

The Week in Dark Web – 16 May 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

May 9, 2022

The Week in Dark Web – 9 May 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

April 25, 2022

The Week in Dark Web – 25 April 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

April 18, 2022

The Week in Dark Web – 18 April 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

March 31, 2022

What Cyber Security Experts Think: How to Make Money on the Dark Web?

People increasingly purchase and sell items in the Internet's most obscure corners. Amazon, Shopify, Walmart, and eBay are all well-known e-commerce platforms. These are frequently the first internet stores where we purchase our goods. However,… Continue Reading

What-is-Red-Teaming-and-How-Does-It-Work
March 30, 2022

What is Red Teaming and How Does It Work?

Red Teaming is a multi-layered attack simulation that assesses how well a company's people, networks, applications, and physical security controls can survive an attack from a real-world opponent. A red teaming assessment aims to show… Continue Reading

March 28, 2022

The Week in Dark Web – 28 March 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

March 28, 2022

Anonymous Threatened Western Companies Operating in Russia Raises Concerns of Cyber Attack

Global hacktivist group Anonymous has threatened a list of companies that continue to operate in Russia, unlike many Western companies that suspended doing business due to Moscow’s decision to invade Ukraine. In a tweet post from… Continue Reading

March 21, 2022

The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

March 14, 2022

The Week in Dark Web – 14 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

March 5, 2022

Lapsu$ Extortion Group Allegedly Leaked Samsung Source Code After Nvidia Breach

The infamous Lapsu$ Extortion Group has become a newsworthy threat actor while the cyber incidents escalated during the Russian invasion of Ukraine. While the group’s claim on stolen data from Nvidia GPU Designer is still… Continue Reading

March 4, 2022

Five Vulnerabilities Discovered in PJSIP Library This Week

PJSIP, an open-source library, is one of the most used libraries used by WhatsApp and many other VoIP applications. Recently, critical RCE bugs were detected from the PJSIP open source library. This week, PJSIP discovered… Continue Reading

March 2, 2022

Timeline: The Russian – Ukranian Cyber Space Wars

February 13: A file matching the DDoS attack IoCs was uploaded to VirusTotal. February 15 & 16: Some Ukrainian websites were not accessible due to heavy DDoS attacks. Both UK and US officials have attributed… Continue Reading

March 1, 2022

What Do Conti’s Leaks Tell Us about Ransomware Groups?

Conti, a dangerous ransomware gang that first appeared in December 2019, resided in Saint Petersburg, Russia, from the very beginning. During the actual conflict between Ukraine and Russia, eyes were naturally turned to the side… Continue Reading

February 28, 2022

The Week in Dark Web – 28 February 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

What-You-Need-to-Know-About-Russian-Cyber-Escalation-in-Ukraine
February 25, 2022

What You Need to Know About Russian Cyber Escalation in Ukraine

UPDATE February 26, 2022, 04.40 AM (EST): This blog has been updated with details of posts of the Conti ransomware group and Anonymous. UPDATE February 27, 2022, 05.50 AM (EST): This blog has been updated with details… Continue Reading

SOCRadar-Turkey-Threat-Landscape-Report-Dark-Web-Threats-on-the-Rise
February 8, 2022

SOCRadar Turkey Threat Landscape Report: ‘Skyrocketing Ransomware Threats in 2021’

Ransomware attacks are on the rise around the world. In 2021, we saw the names of various threat actors in the headlines. The revenue of 10 significant ransomware gangs that attack critical infrastructures reached $5.2… Continue Reading

January 31, 2022

The Week in Dark Web – 31 January 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

January 27, 2022

What is Network Port?

Computers must have an IP address to communicate with each other. IP addresses are divided into ports, which means virtual buses. It means port. However, its equivalent in computer language is a bridge.  Thanks to… Continue Reading

Dozens-of-WordPress-Plugins-Backdoored-in-Supply-Chain-Attack
January 24, 2022

Dozens of WordPress Plugins Backdoored in Supply Chain Attack

Dozens of WordPress themes and plugins hosted on a developer's website were backdoored in a supply chain attack. with malicious code in September 2021 with the goal of infecting further sites. The backdoor gave the… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo