Blog

Latest articles from SOCRadar

How to Prevent Attacks by APT Groups Using SOCRadar
September 24, 2021

How to Prevent Attacks by APT Groups Using SOCRadar

What is an APT Group? The advanced persistent threat (APT) is a stealthy method to gain access to your company’s data. It requires a high degree of secrecy, skill, and patience – which is why… Continue Reading

The Most Common Phishing Method Used by Cyber Scammers on WhatsApp
September 23, 2021

The Most Common Phishing Method Used by Cyber Scammers on WhatsApp

WhatsApp is the most downloaded and used messaging application by users in the world. For this reason, cyberattacks on WhatsApp can reach many people much faster than others. There is no single attacker type of… Continue Reading

conti ransomware
September 22, 2021

Dark Web Threat Profile: Conti Ransomware Group

Getting Acquainted with Conti Conti Ransomware, an active and dangerous ransomware gang threatening corporations in multiple sectors, is a force to be reckoned with. The gang was first observed in December 2019 and began operating… Continue Reading

tactical cyber threat intelligence
September 21, 2021

What is Tactical Cyber Threat Intelligence and How to Use it

As cyber threats become more complex than ever, many organizations devote more resources to their security programs. Almost every organization creates security teams to deploy network solutions and address threats. A vital component of the… Continue Reading

September 20, 2021

The Week in Dark Web – 20 September 2021 – Cybercrime Business Evolves

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

how to detect phishing
September 17, 2021

How to Detect Phishing Attacks?

1-What is a Phishing Attack? Phishing is a cyberattack that collects sensitive information such as login credentials, credit card numbers, bank account numbers, or other financial information by pretending to be a real website or… Continue Reading

cyberspace search engine
September 14, 2021

Top 5 Cyberspace Search Engines Used by Security Researchers

We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?… Continue Reading

September 13, 2021

The Week in Dark Web – 13 September 2021 – A Mix of Cyber Attacks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

ransomware gangs
September 9, 2021

CISA Alert: Ransomware Gangs Take Advantage of Holidays

It’s not hard to say that many security teams worldwide are understaffed and overworked. On August 31, 2021, The FBI and the CISA released an advisory: “Ransomware Awareness for Holidays and Weekends” aiming to mention… Continue Reading

socmint
September 7, 2021

How to Use SOCMINT for Better Cause?

With the increasing use of social media by private and public practitioners, advanced methods of collecting and analyzing social media data, known as Social Media Intelligence (SOCMINT) have become an important means of gathering information.… Continue Reading

how to detec bec attacks
September 2, 2021

How to Detect BEC Attacks?

1- What is a BEC attack? A Business Email Compromise (BEC) attack is a cyberattack involving the hijacking, spoofing, or impersonation of a business email address. The victim of a BEC attack receives an email… Continue Reading

August 30, 2021

The Week in Dark Web – 30 August 2021 – The Rise of Cybercrime in Asia

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

domain hijacking
August 27, 2021

How to Detect Domain Hijacking Attacks?

1- What is a Domain Hijacking Attack? Domain Hijacking (Domain Name Theft), the control of a domain name, a domain name to be changed without the permission of the original owner of the registration or… Continue Reading

domain hijacking
August 23, 2021

Detecting IoT Devices For Your Company

From smart wearables to interconnected industrial devices the IOT is becoming a larger part of our lives since the first coinage of the term in 1999 at a P&G presentation (although the idea goes far… Continue Reading

socradar blog cti
August 16, 2021

What is Strategic Cyber Intelligence and How to Use it

As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to… Continue Reading

August 13, 2021

The Week in Dark Web – 13 August 2021 – Ransomware and Database Hacking Incidents

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

socradar blog post on Lockbit ransomware
August 2, 2021

The Story of Lockbit Ransomware

After penetrating the network, the attackers take several steps to ensure that the Ransomware attack is successful. They want to infect as many systems as possible, stop business processes and urge victims to pay ransom.… Continue Reading

July 30, 2021

The Week in Dark Web – 30 July 2021 – LockBit Strikes Again

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

socradar-ssl certificate monitoring
July 26, 2021

How to Monitor Your SSL Certificates Expiration Easily and Why

SSL is a secure socket layer certificate, a small data file that establishes a secure connection between a web page and a browser. HTTPS websites use SSL certificates to secure the connection between the user's… Continue Reading

July 23, 2021

The Week in Dark Web – 23 July 2021 – Ransomware to Data Theft

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

Newsletter

powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo