Blog

Latest articles from SOCRadar

How to Identify Spear Phishing?
March 25, 2022

How to Identify Spear Phishing?

Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading

Automotive Industry Under Ransomware Attacks
March 25, 2022

Automotive Industry Under Ransomware Attacks

Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. According to a recent analysis on threat trends, about half of the top 100 manufacturers are… Continue Reading

Telegram: A New Place for Hackers
March 24, 2022

Telegram: A New Place for Hackers

One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading

What is a Phishing Kit?
March 24, 2022

What is a Phishing Kit?

A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with little or no phishing experience to… Continue Reading

What is Cybersecurity in 2022?
March 23, 2022

Let’s Start from the Beginning: What is Cybersecurity in 2022?

The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as IT security, prevent threats to networked systems and applications, whether they come from within or… Continue Reading

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak
March 22, 2022

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak

The Lapsus$ group has announced that they are responsible for authentication service provider Okta's digital breach. Threat actors posted screenshots on their Telegram channel, showing the internal system.  Cyber security experts think that the attack… Continue Reading

What is EMOTET Malware and How to Protect Yourself
March 22, 2022

What is EMOTET Malware and How to Protect Yourself

According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading

March 21, 2022

The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

AvosLocker Ransomware
March 21, 2022

Dark Web Profile: AvosLocker Ransomware

AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, striking attacks began to occur. The group, which operates as a ransomware-as-a-service (RaaS),… Continue Reading

How Can Reinforce Your Brand Protection Against Cyber Threats
March 21, 2022

How Can Reinforce Your Brand Protection Against Cyber Threats?

The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must confront to secure essential and sensitive corporate data. Companies must discover brand protection solutions to mitigate their growing exposure to cyber-related… Continue Reading

Azerbaijan Threat Landscape Report
March 18, 2022

SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for Threat Actors

Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for threat actors. The SOCRadar Threat Landscape Report provides an in-depth understanding of cyber incidents occurring or likely to occur in the country in 2021.… Continue Reading

Conti Leaks
March 18, 2022

An Overview on Conti Ransomware Leaks: Is This the End for Conti?

Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There has been a massive spike in cyberattacks parallel to physical aggression, affecting many Ukrainian organizations… Continue Reading

What Do You Need To Know About Vulnerability Intelligence
March 17, 2022

What Do You Need To Know About Vulnerability Intelligence

A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading

B1txor20 Malware Exploiting Log4J Vulnerability
March 16, 2022

B1txor20 Malware Exploiting Log4J Vulnerability

Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in this malware cluster. Let's take a closer look at B1txor20, which… Continue Reading

APT41 Double Dragon
March 15, 2022

Deep Web Profile: APT41/Double Dragon

APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operations that may be outside the authority of the Chinese government. Explicit… Continue Reading

Veeam Vulnerabilities Discovered
March 15, 2022

Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication

Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code execution (RCE). CVE-2022-26500 and CVE-2022-26501 with CVSS scores of 9.8 are located on Veeam Distribution Services.… Continue Reading

March 14, 2022

The Week in Dark Web – 14 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

what-should-we-learn-from-the-conti-hse-ireland-attack
March 11, 2022

What Should We Learn From the Conti’s HSE Ireland Attack?

Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even target critical sectors such as healthcare. A more proactive understanding of cyber security is… Continue Reading

iso-27001-27002-2022
March 10, 2022

ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27000 series and their importance  ISO 27000 series consist of the standards determined by the International Organization for Standardization (ISO). It offers the best approaches for information security management systems (ISMS), focusing on controlling… Continue Reading

who-is-stormous-ransomware-group
March 10, 2022

Dark Web Profile: Who is ‘Stormous Ransomware’ Claiming to Leak Epic Games Information

The Stormous ransomware group has touted itself as the actor behind some attacks since early 2022. Discussions began to revolve around some of these attacks being carried out by other threat actors, with the Stormous… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo