Blog

Latest articles from SOCRadar

July 12, 2021

An overview of Verizon’s 2021 Data Breach Investigation Report: An Overall Summary for Industries, Incident Classification Patterns and SMBs.

For adapting to the changing Cyber Threat World, you need to be aware of what is happening around your industry vector and how threat actors are changing their TTPs. Every minute, any industry or SMB… Continue Reading

July 9, 2021

The Week in Dark Web – 9 July 2021 – Access and Database

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 5, 2021

The What, Where & When for Effective Dark Web Threat Hunting

Many companies worldwide have implemented dark web monitoring tools to detect emerging cyber risks proactively. However, hunting threats on the dark web is an extremely skillful and accurate work to prevent discovery without your cover… Continue Reading

June 28, 2021

How to Detect Your Network is Used by Botnets Without Touching Your Systems?

Malicious bots called "bad bots" not only evolve continually, but are very specific to certain applications, such as defense providers or even evasion tactics, as the talents and degree of development for humans and bots.… Continue Reading

June 25, 2021

The Week in Dark Web – 25 June 2021 – Threat Actor Syndicate

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

June 24, 2021

Best OSINT Resources to Follow

One of the benefits of the cyber security is its openness to sharing. There is a good sense of community in the industry with people freely creating and sharing tools. In this blog post, we… Continue Reading

June 21, 2021

Comparing MEA (Middle East and Africa) and Europe against the Dark Web Threats

Companies that wish to safeguard customers and employees typically invest in Dark Web monitoring solutions to warn them if their compromised data are offered or sold on dark web forums since they cannot do so… Continue Reading

June 18, 2021

The Week in Dark Web – 18 June 2021 – Hackers Gonna Hack

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

June 14, 2021

Did You Try SOCRadar Global DeepWeb Sonar Report Yet?

Unidentified attackers have apparently unlimited resources, pressuring security authorities to regularly evaluate all aspects of their security strategy. People, procedures and technology must be examined in order to guarantee that every important component is optimized… Continue Reading

June 11, 2021

The Week in Dark Web – 11 June 2021 – Deep Web Havoc

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

June 7, 2021

Best Practices for External Attack Surface Management (ASM) with Use-Cases

 Gartner has predicted that by 2021, one-third of successful attacks on the enterprise will be through shadow IT resources and leaked sensitive information1.   According to Verizon’s DBIR (Data Breach Investigation Report) in 2021, 70%… Continue Reading

June 4, 2021

The Week in Dark Web – 4 June 2021 – Down the Deep Web

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

May 31, 2021

Disrupt Attacker Infrastructure to Prevent Future Attacks with Takedown Service

Malware and phishing sites harm companies and organizations all over the world. Through removing sites and blocking attack infrastructures, takedown services strive to minimize the return on investment of the attackers so as to lessen… Continue Reading

May 28, 2021

The Week in Dark Web – 21 May 2021 – Hacking Worldwide

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

May 24, 2021

Re-examining the Pyramid of Pain to Use Cyber Threat Intelligence More Effectively

  The Pyramid of Pain was initially established in 2013 by security specialist David J Bianco in order to increase the applicability of the attack indicators by focusing on incident and threat hunting.   The Pyramid… Continue Reading

May 21, 2021

The Week in Dark Web – 21 May 2021 – Deep Web Asia

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

May 17, 2021

From Fuel Shortages to Gas Hikes: How the Colonial Pipeline Co. Fell Victim to a Ransomware Attack?

 On May 7, 2021, Colonial Pipeline suffered a ransomware attack that impacted computerized equipment managing the pipeline. The attack was the largest cyberattack on an oil infrastructure target in the history of the United States.… Continue Reading

May 14, 2021

The Week in Dark Web – 14 May 2021 – Attacks Escalate

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Ransomware attacks, company database theft, and stealing personal data are on the rise and took their place on the… Continue Reading

May 13, 2021

How to detect if your IP addresses are being used in DHT Networks?

Peer-to-peer networks are still being used in many parts of the World to download music, software, or movies. In its heyday peer 2 peer traffic was driving a considerable chunk of internet traffic.  A 2018 estimate… Continue Reading

May 10, 2021

Is RDAP (Registration Data Access Protocol) Going to Replace WHOIS?

RDAP was created as a WHOIS system successor and is ultimately expected to replace WHOIS as the official source for IP addresses, Domain Names, Autonomous Systems, and many other registry data. RDAP uses an HTTP… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo