Blog

Latest articles from SOCRadar

August 30, 2021

The Week in Dark Web – 30 August 2021 – The Rise of Cybercrime in Asia

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

domain hijacking
August 27, 2021

How to Detect Domain Hijacking Attacks?

1- What is a Domain Hijacking Attack? Domain Hijacking (Domain Name Theft), the control of a domain name, a domain name to be changed without the permission of the original owner of the registration or… Continue Reading

domain hijacking
August 23, 2021

Detecting IoT Devices For Your Company

From smart wearables to interconnected industrial devices the IOT is becoming a larger part of our lives since the first coinage of the term in 1999 at a P&G presentation (although the idea goes far… Continue Reading

socradar blog cti
August 16, 2021

What is Strategic Cyber Intelligence and How to Use it

As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to… Continue Reading

August 13, 2021

The Week in Dark Web – 13 August 2021 – Ransomware and Database Hacking Incidents

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

socradar blog post on Lockbit ransomware
August 2, 2021

The Story of Lockbit Ransomware

After penetrating the network, the attackers take several steps to ensure that the Ransomware attack is successful. They want to infect as many systems as possible, stop business processes and urge victims to pay ransom.… Continue Reading

July 30, 2021

The Week in Dark Web – 30 July 2021 – LockBit Strikes Again

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

socradar-ssl certificate monitoring
July 26, 2021

How to Monitor Your SSL Certificates Expiration Easily and Why

SSL is a secure socket layer certificate, a small data file that establishes a secure connection between a web page and a browser. HTTPS websites use SSL certificates to secure the connection between the user's… Continue Reading

July 23, 2021

The Week in Dark Web – 23 July 2021 – Ransomware to Data Theft

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 19, 2021

The Most Dangerous of Their Kind Remote Code Execution (RCE) Attacks

 Remote Code Execution (RCE) is a class of software vulnerabilities. An RCE vulnerability allows a malicious actor to execute code of their choice over a LAN (WAN) or Internet on a remote machine. RCE belongs to… Continue Reading

July 16, 2021

The Week in Dark Web – 16 July 2021 – Incidents from the MENA Region and Mexico

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 12, 2021

An overview of Verizon’s 2021 Data Breach Investigation Report: An Overall Summary for Industries, Incident Classification Patterns and SMBs.

For adapting to the changing Cyber Threat World, you need to be aware of what is happening around your industry vector and how threat actors are changing their TTPs. Every minute, any industry or SMB… Continue Reading

July 9, 2021

The Week in Dark Web – 9 July 2021 – Access and Database

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 5, 2021

The What, Where & When for Effective Dark Web Threat Hunting

Many companies worldwide have implemented dark web monitoring tools to detect emerging cyber risks proactively. However, hunting threats on the dark web is an extremely skillful and accurate work to prevent discovery without your cover… Continue Reading

June 28, 2021

How to Detect Your Network is Used by Botnets Without Touching Your Systems?

Malicious bots called "bad bots" not only evolve continually, but are very specific to certain applications, such as defense providers or even evasion tactics, as the talents and degree of development for humans and bots.… Continue Reading

June 25, 2021

The Week in Dark Web – 25 June 2021 – Threat Actor Syndicate

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

June 24, 2021

Best OSINT Resources to Follow

One of the benefits of the cyber security is its openness to sharing. There is a good sense of community in the industry with people freely creating and sharing tools. In this blog post, we… Continue Reading

June 21, 2021

Comparing MEA (Middle East and Africa) and Europe against the Dark Web Threats

Companies that wish to safeguard customers and employees typically invest in Dark Web monitoring solutions to warn them if their compromised data are offered or sold on dark web forums since they cannot do so… Continue Reading

June 18, 2021

The Week in Dark Web – 18 June 2021 – Hackers Gonna Hack

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

June 14, 2021

Did You Try SOCRadar Global DeepWeb Sonar Report Yet?

Unidentified attackers have apparently unlimited resources, pressuring security authorities to regularly evaluate all aspects of their security strategy. People, procedures and technology must be examined in order to guarantee that every important component is optimized… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo