Latest articles from SOCRadar
WhatsApp is the most downloaded and used messaging application by users in the world. For this reason, cyberattacks on WhatsApp can reach many people much faster than others. There is no single attacker type of… Continue Reading
Getting Acquainted with Conti Conti Ransomware, an active and dangerous ransomware gang threatening corporations in multiple sectors, is a force to be reckoned with. The gang was first observed in December 2019 and began operating… Continue Reading
As cyber threats become more complex than ever, many organizations devote more resources to their security programs. Almost every organization creates security teams to deploy network solutions and address threats. A vital component of the… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading
1-What is a Phishing Attack? Phishing is a cyberattack that collects sensitive information such as login credentials, credit card numbers, bank account numbers, or other financial information by pretending to be a real website or… Continue Reading
We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading
It’s not hard to say that many security teams worldwide are understaffed and overworked. On August 31, 2021, The FBI and the CISA released an advisory: “Ransomware Awareness for Holidays and Weekends” aiming to mention… Continue Reading
With the increasing use of social media by private and public practitioners, advanced methods of collecting and analyzing social media data, known as Social Media Intelligence (SOCMINT) have become an important means of gathering information.… Continue Reading
1- What is a BEC attack? A Business Email Compromise (BEC) attack is a cyberattack involving the hijacking, spoofing, or impersonation of a business email address. The victim of a BEC attack receives an email… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading
What is a Domain Hijacking Attack? Domain Hijacking (Domain Name Theft), the control of a domain name, a domain name to be changed without the permission of the original owner of the registration or domain name… Continue Reading
From smart wearables to interconnected industrial devices the IOT is becoming a larger part of our lives since the first coinage of the term in 1999 at a P&G presentation (although the idea goes far… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading
After penetrating the network, the attackers take several steps to ensure that the Ransomware attack is successful. They want to infect as many systems as possible, stop business processes and urge victims to pay ransom.… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading
SSL is a secure socket layer certificate, a small data file that establishes a secure connection between a web page and a browser. HTTPS websites use SSL certificates to secure the connection between the user's… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading
Remote Code Execution (RCE) is a class of software vulnerabilities. An RCE vulnerability allows a malicious actor to execute code of their choice over a LAN (WAN) or Internet on a remote machine. RCE belongs to… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading