Blog

Latest articles from SOCRadar

January 5, 2022

APT Profile: Who is Phosphorus?

Phosphorus is an attack group linked to the Iranian government, also known as Charming Kitten, Ajax Security, NewsBeef, which has been very active since 2017. Its targeting strategy aligns with Iran's Islamic Revolutionary Guard Corps. … Continue Reading

January 5, 2022

Windows Server Update Fixes Remote Desktop Issues

Microsoft has released an update that fixes remote desktop vulnerabilities detected on Windows Server. On January 4, in the announcement shared by the company, it was emphasized that a non-routine update was shared, and vulnerabilities should be… Continue Reading

December 30, 2021

What is Cyber Threat Intelligence?

Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence. This information is used to predict, prevent, and identify cyber-threats attempting to… Continue Reading

December 29, 2021

Cyber Law Round-Up: SOCRadar’s Curation for Recent Cyber Legislations Across the World in 2021

As security threats and ransomware incidents ramp up, governments rush to keep up with this pace by developing new legislative acts, laws, and regulations. The internet has now become an integral part of everyone's daily… Continue Reading

December 28, 2021

Top 5 Cyber Attacks in the Asia Pacific (APAC) in 2021

As the end of the year approaches, we continue to compile the prominent cyber security news of the year specific to the regions. Address to four of the five most crowded populations globally, the Asia… Continue Reading

Vulnerability-Round-Up-SOCRadars-Curation-of-Critical-Vulnerabilities-for-2021
December 27, 2021

Vulnerability Round-Up: SOCRadar’s Curation of Critical Vulnerabilities for 2021

Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vulnerabilities. Prioritization based on the value to the business and exposure to the attacks is… Continue Reading

December 27, 2021

How to Minimize Your Attack Surface in 5 Ways

Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minimal as possible. Organizations must constantly monitor their attack surfaces to identify and… Continue Reading

What-is-a-Rootkit-and-How-to-Detect-it
December 24, 2021

What is a Rootkit and How to Detect It

A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can also infect the hardware and firmware of your… Continue Reading

Top-Cyber-Threats-to-the-Finance-Sector-in-2021
December 24, 2021

Top Cyber Threats to the Finance Sector in 2021

Threat actors are increasingly targeting financial institutions for monetary gains. SOCRadar CTIA team continuously monitors the deep and dark web sources to gain visibility into threat actors tirelessly targeting the finance sector in 2021. We… Continue Reading

December 23, 2021

What is Operational Cyber Threat Intelligence and How to Use It

Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to the success of these initiatives is access to up-to-date cyber threat intelligence.  This blog describes the… Continue Reading

December 22, 2021

Let’s Start From the Beginning: What is Encryption?

Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOCRadar's "101" articles on the subject of encryption. With the most concise definition, encryption… Continue Reading

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
December 21, 2021

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022

If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, then it needs a BYOD security policy.  What is BYOD? Initially, employees used only company-issued devices… Continue Reading

December 20, 2021

Top 5 Cyber Attacks Targeting DACH Region in 2021

Germany, Austria, and Switzerland (DACH) region, home to many giant companies with advanced IoT and artificial intelligence technologies, has been under significant cyber threats in recent years.   Among these threats, while mobile vulnerabilities stood out… Continue Reading

December 17, 2021

SOCRadar Recognized as a Threat Intelligence Representative Vendor in the Latest Gartner Report

SOCRadar is recognized as a Threat Intelligence Representative Vendor in Gartner's latest reports on the cybersecurity market. Technology, research, and consulting firm Gartner published the report on December 10, 2021. SOCRadar's Risk Prime and Threat… Continue Reading

Top Cyber Attacks to Cryptocurrency Exchanges and Blockchain Companies in 2021
December 15, 2021

Top Cyber Attacks to Cryptocurrency Exchanges and Blockchain Companies in 2021

While leaving behind the most critical vulnerability of the year, it is time to look at the issues discussed by the cybersecurity world throughout 2021. We have compiled the cyberattacks on the blockchain technology front,… Continue Reading

December 11, 2021

What Do You Need to Know About the Log4j Critical Vulnerability and What Can You Do?

Last update: January 4, 2021 In the last 72 hours, the entire cyber security community has focused on the critical vulnerability of Log4j, actively used in millions of systems. We can even see the effect of… Continue Reading

How-Global-Law-Enforcement-Deal-With-the-Ransomware-Crisis
December 10, 2021

How does Global Law Enforcement deal With the Ransomware Crisis?

Ransomware attacks have been increasing in recent years. In October, more than thirty countries came together at a summit on how to take action in this regard. This article has compiled different legal methods used… Continue Reading

December 9, 2021

What is Technical Cyber Threat Intelligence and How to Use It

As cyber threats become more sophisticated, many organizations pay more attention to their security programs. Organizations of all sizes build security teams to deploy network solutions and address threats.  A key component to the success… Continue Reading

December 8, 2021

What are SMB Ports?

The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sharing are just a few of the network functions enabled by SMB.… Continue Reading

December 7, 2021

Dark Web Profile: Hive Ransomware Group

Recently, on November 8, electronics retail giant Media Markt has suffered a ransomware attack with an initial ransom demand of $240 million, causing IT systems to shut down and store operations to be disrupted in… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo