
Best Threat Detection and Response (TDR) Practices
Best Threat Detection and Response (TDR) Practices The ability to detect and respond to threats swiftly is more critical than ever. Organizations must adopt a robust Threat Detection and Response (TDR...

Advanced Strategies for Effective Network Security Monitoring
Advanced Strategies for Effective Network Security Monitoring Network Security Monitoring (NSM) is critical for safeguarding an organization’s IT infrastructure against cyber threats. It involves coll...

What is IOC Management?
What is IOC Management? IOC Management is a critical aspect of cybersecurity that involves identifying, handling, and responding to data points indicating potential security breaches or malicious acti...

IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybe...
IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybersecurity Failures Managing a data breach goes beyond simply addressing the financial impact; it involves tackling a crisis that c...

What is Pretexting? Definition and Examples in Cybersecurity
What is Pretexting? Definition and Examples in Cybersecurity Pretexting is a social engineering tactic in which attackers fabricate a scenario or a “pretext” to trick people into disclosin...

Hackers Claim a Zoom Breach, Alleged FedEx Accounts and Government Log...
Hackers Claim a Zoom Breach, Alleged FedEx Accounts and Government Logs on Sale Over the past week, the SOCRadar Dark Web Team has uncovered several alarming cyber threats targeting various sectors. N...

Shedding Light on Indonesia Threat Landscape Report 2024
Shedding Light on Indonesia Threat Landscape Report 2024 In the rapidly evolving digital age, Indonesia, Southeast Asia’s largest economy, has emerged as a focal point for cyber threats. As the countr...

Annual Europe Threat Landscape Report 2024
Annual Europe Threat Landscape Report 2024 In an era where cyber threats evolve rapidly, staying ahead of the curve is essential. Our latest Annual Europe Threat Landscape Report 2024 offers a compreh...

August 2024 Patch Tuesday Highlights: 89 CVEs, 6 Zero-Day Vulnerabilit...
August 2024 Patch Tuesday Highlights: 89 CVEs, 6 Zero-Day Vulnerabilities Under Exploitation [Update] September 4, 2024: “Details of CVE-2024-38106 and PoC Exploit” [Update] August 20, 2024: “Lazarus ...

Dark Web Profile: Cyber Army of Russia Reborn
Dark Web Profile: Cyber Army of Russia Reborn In Russian Народная CyberАрмияa (People’s CyberArmy) is a prominent hacktivist group involved in disruptive attacks on critical infrastructure and financi...

Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Br...
Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Breaches, Misconfigurations, and More) In the fast-changing world of cloud computing, it’s essential for both organizations and prof...

Alleged Leaks: Tencent, FTD Educação, and Yellow Pages Data Exposed
Alleged Leaks: Tencent, FTD Educação, and Yellow Pages Data Exposed The SOCRadar Dark Web Team has identified several significant cyber threats in the past week. These include the sale of 21,000 U.S. ...

SOCRadar APAC Threat Landscape Report: Gain Insights Into Threats &...
SOCRadar APAC Threat Landscape Report: Gain Insights Into Threats & Trends from the APAC Region Understanding localized cybersecurity issues is more important than ever in a time when cyber threat...

Dark Peep #16: Play Ransomware & LockBit's Alliance, BreachForums ...
Dark Peep #16: Play Ransomware & LockBit’s Alliance, BreachForums Leak, and CyberNiggers’ Revival Welcome to Dark Peep #16, where we unravel the freshest and most daring cyber capers. ...

Critical Vulnerabilities in Progress WhatsUp Gold, Jenkins Could Lead ...
Critical Vulnerabilities in Progress WhatsUp Gold, Jenkins Could Lead to RCE Attacks (CVE-2024-4885, CVE-2024-43044) A critical vulnerability in Progress WhatsUp Gold, recently patched, has been activ...

Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training...
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns The cybersecurity landscape constantly evolves, and staying ahead of emerging threats with complicated risks is more cruc...

5 Supply Chain Intelligence Use Cases with SOCRadar Module
5 Supply Chain Intelligence Use Cases with SOCRadar Module Numerous high-profile incidents have evidenced that cyber threats to the supply chain can have catastrophic consequences. To mitigate these r...

SOCRadar Recognized in Gartner Report on Digital Risk Protection Servi...
SOCRadar Recognized in Gartner Report on Digital Risk Protection Services and External Attack Surface Management Again In a report published by Gartner on its website on July 29, 2024, SOCRadar was hi...

Major Cyber Attacks in Review: July 2024
Major Cyber Attacks in Review: July 2024 July 2024 has been marked by a series of high-impact cyber attacks, affecting millions of individuals and numerous organizations. Amidst numerous threat activi...

SOCRadar's Response to the USDoD’s Claim of Scraping 330 Million Email...
SOCRadar’s Response to the USDoD’s Claim of Scraping 330 Million Emails TL;DR The claim that the threat actor extracted the data from the SOCRadar platform is inaccurate and does not reflect the t...