Blog

Latest articles from SOCRadar

8 Ways to Prevent Supply Chain Attacks
May 3, 2022

8 Ways to Prevent Supply Chain Attacks

Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others. Attackers including APT actors have been observed to be attacking… Continue Reading

5 Tips for Social Media Security
May 2, 2022

5 Tips for Social Media Security

Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and identity theft have become commonplace attacks targeted at individuals.… Continue Reading

Real-Life Examples of Machine Learning in Cybersecurity
May 2, 2022

Real-Life Examples of Machine Learning in Cybersecurity

Artificial Intelligence and Machine Learning: A Thriving Concept in the World of Cybersecurity There’s no question that artificial intelligence and machine learning are two major points of interest in technology in the 21st century. Everyone… Continue Reading

Ethical Issues Behind Cybersecurity
April 28, 2022

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and espionage. As a result, cybersecurity approaches and solutions have become increasingly sophisticated and comprehensive… Continue Reading

Why do Companies Need Cybersecurity?
April 27, 2022

Why do Companies Need Cybersecurity?

Cybersecurity encompasses all technologies and techniques that ensure the integrity of computer systems and electronic data. And, at an age where more and more of our business and social lives are conducted online, this is… Continue Reading

Critical Vulnerability in WSO2 Products Could Allow RCE
April 27, 2022

Critical Vulnerability in WSO2 Products Could Allow RCE

It turned out that a critical vulnerability that affects the products of WSO2 and enables RCE has been actively exploited. WSO2 has a wide portfolio of clients worldwide from banking and finance, energy, IT, telecommunications, etc., and… Continue Reading

How to Prevent Steganography Attacks
April 26, 2022

How to Prevent Steganography Attacks

Steganography is an antique soft craft concealing information in paintings or different art products. Most artists use this technique to hide their signatures and additional concealed messages within their artworks. Origin of the Word "Steganography"… Continue Reading

April 25, 2022

The Week in Dark Web – 25 April 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

Cyber Security Awareness Days Worldwide
April 25, 2022

Top 10 Cyber Security Awareness Days Worldwide

Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to toe to protect private life and privacy, company information, and… Continue Reading

T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code
April 25, 2022

T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code

Telecommunications company T-Mobile confirmed that the Lapsus$ extortion group had accessed the company's internal systems and breached its source code a few weeks ago. In a statement on April 22, the company also emphasized that it… Continue Reading

Atlassian Patches Jira Authentication Bypass Vulnerability
April 23, 2022

Atlassian Patches Jira Authentication Bypass Vulnerability

Atlassian has released a security advisory announcing a critical authentication bypass vulnerability in Seraph, the company's web framework, affecting Jira products. The CVSS score of the CVE-2022-0540 vulnerability is 9.9, and it is a very… Continue Reading

Growing Attack Surfaces and Examples
April 21, 2022

Growing Attack Surfaces and Examples 

Your organization's attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. This might involve flaws in your organization's personnel, physical, network,… Continue Reading

The Ultimate Guide to Brand Protection
April 20, 2022

The Ultimate Guide to Brand Protection

As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter the domain to use legitimate advances produced by corporations to bolster their… Continue Reading

Deep Web Profile: AgainstTheWest/BlueHornet Part 2
April 20, 2022

Deep Web Profile: AgainstTheWest / BlueHornet [Part 2]

As explained in the first part, the famous leak group AgainstTheWest/BlueHornet decided to shut their operations after their unsuccessful private forum attempt. Still, two significant incidents had crucial effects on their decision: the shutdown of RaidForums on… Continue Reading

How to Use SOCRadar Integrations?
April 19, 2022

How to Use SOCRadar Integrations?

SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platform, Vulnerability Management, Ticketing, and Team Meeting to better serve its customers. Thanks to these integrations, it helps you take action regarding… Continue Reading

What are the Different Types of Attacks in Cybersecurity?
April 18, 2022

What are the Different Types of Attacks in Cybersecurity?

A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devices. Cyber attacks come in many flavors, each capable of attacking a specific computer… Continue Reading

April 18, 2022

The Week in Dark Web – 18 April 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

Comparing Benefits from Different Security Monitoring Services
April 18, 2022

Comparing Benefits from Different Security Monitoring Services

By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U.S. and China. McAfee states cybercrimes accounted for 14% of the entire… Continue Reading

What Do You Need To Know About Cybersecurity in Power Grids
April 15, 2022

What Do You Need To Know About Cybersecurity in Power Grids

Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading

Deep Web Profile: AgainstTheWest / BlueHornet
April 15, 2022

Deep Web Profile: AgainstTheWest / BlueHornet [Part 1]

In October 2021, a new leak group emerged in RaidForums with the handle AgainstTheWest. They have started actively targeting major organizations and state-affiliated corporations in China. Part 1: The Birth of AgainstTheWest Their fame grew… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo