Blog

Latest articles from SOCRadar

February 12, 2022

How To Track APT Groups and Get Fresh IOC/TTP?

50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren't even discovered by the victims themselves but through third-party notification. Open Source Intelligence (OSINT) is not only useful but… Continue Reading

by
March 12, 2021

The Week in Dark Web – 12 March 2021 – Zero-Day Exploits and Then Some

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Database sale of an Israeli company, 2M Indonesian citizens PII data leak, Cobalt Strike new edition on sale are… Continue Reading

by
March 11, 2021

Under the Spotlight: Most Popular Dark Web Marketplaces (DWMs)

!!!FOR EDUCATIONAL AND RESEARCH PURPOSES ONLY!!! The demand for malicious and illegal products, services, and data has hit new peaks across dark web marketplaces (DWMs), due to COVID19 and related global trends. The vendors on… Continue Reading

by
March 10, 2021

How Credit Cards Get Stolen and Abused on the Deep & Dark Web

According to the latest Nilson report from 2019, the cost of payment card fraud was $28 billion worldwide in 2019. Similarly, the Federal Trade Commission reports the majority of the fraud losses reported to them… Continue Reading

by
March 5, 2021

The Week in Dark Web – 05 March 2021 – Paypal & Fortune 500 Company Access Leaked

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Paypal user credentials leak, Fortune 500 company network access sale, ransomware attacks on various companies from different backgrounds like… Continue Reading

by
March 1, 2021

Shadow IT Explained: What Are the Risks and How Can You Mitigate Them?

A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading

by
February 26, 2021

The Week in Dark Web – 26 February 2021 – 37M LinkedIn User Data Leaked

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Linkedin user data leak, RDP credential sales, ransomware attacks on worldwide companies and government institutions were among them Here… Continue Reading

by
February 22, 2021

Your Third-Party Is Now Your Weakest Link. How To Guard It?

The news of the state-sponsored attacks last year on up to 18,000 customers of the SolarWinds is just worsening. The SolarWinds attacks were confirmed by the New York Times to have infiltrated, as was first… Continue Reading

by
February 19, 2021

The Week in Dark Web – 19 February 2021 – RDP Credential Sales on the Rise

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week, including major RDP credential sales, ransomware attacks on global corporations, and even some government organizations. Here is the breakdown… Continue Reading

by
February 15, 2021

What You Need to Know About STIX and TAXII?

STIX and TAXII were developed to improve cyber threat detection and mitigation. STIX stipulates the details of the threat, while TAXII decides the flow of information. STIX and TAXII are machine-readable and thus conveniently automated,… Continue Reading

by
February 8, 2021

CTI is So Critical to SOC Teams for DNS Security

Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per day. These statistics alone can show how critical DNS security is. Many monitoring… Continue Reading

by
February 5, 2021

Dark Web Slang 2

Monitoring the dark web and keeping up with what threat actors are talking about your brand and assets is an extremely important action for enterprises. However, besides the fact that getting into the dark web… Continue Reading

by
February 1, 2021

What Is the Dark Web All About?

Since the 1970s, criminal activities have been coordinated via the internet. However, these early examples would have been rendered in person by way of closed networks and the direct transactions of money and commodities. The… Continue Reading

by
January 28, 2021

Top 5 Remote Code Execution (RCE) Attacks in 2020

According to a recent report[1], more than half of the email service on the Internet were impacted by remote code execution attacks. RCE vulnerabilities are one of the most dangerous of their kind as attackers… Continue Reading

by
January 23, 2021

Dark Web Slang

Monitoring the dark web and keeping up with what threat actors are talking about your brand and assets is an extremely important action for enterprises. However, besides the fact that getting into the dark web… Continue Reading

by
January 18, 2021

The 8 Key Lessons From the SolarWinds Attacks

Nation-state threat actors breached the supply chain of SolarWinds to infiltrate its customers including U.S. government agencies and Fortune 500 companies. At least 18,000 organizations likely downloaded the malicious update, and thus suffered in the… Continue Reading

by
January 10, 2021

Create More Effective SOC With the Mitre ATT&CK Framework

The ATT&CK framework is a powerful tool to improve cyber defence and to create a more effective SOC. According to the SANS report, the MITRE ATT&CK creates; The threat intelligence groups that are known to… Continue Reading

by
January 7, 2021

How Hackers Find Your CEO’s Password and Abuse It

Poor password habits are found everywhere, even in big companies despite the password policies required. The credential leak is one of the most common use cases for a variety of sectors, and enterprises have no… Continue Reading

by
January 6, 2021

2020: The Year in Cybersecurity

One of the trends in cybersecurity that should be noted is the continuing need to further improve the relevant cybersecurity rules. As technology companies operate with big data, it is up to cybersecurity experts to… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo