Latest articles from SOCRadar
Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading
Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. According to a recent analysis on threat trends, about half of the top 100 manufacturers are… Continue Reading
One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading
A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with little or no phishing experience to… Continue Reading
The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as IT security, prevent threats to networked systems and applications, whether they come from within or… Continue Reading
The Lapsus$ group has announced that they are responsible for authentication service provider Okta's digital breach. Threat actors posted screenshots on their Telegram channel, showing the internal system. Cyber security experts think that the attack… Continue Reading
According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, striking attacks began to occur. The group, which operates as a ransomware-as-a-service (RaaS),… Continue Reading
The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must confront to secure essential and sensitive corporate data. Companies must discover brand protection solutions to mitigate their growing exposure to cyber-related… Continue Reading
Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for threat actors. The SOCRadar Threat Landscape Report provides an in-depth understanding of cyber incidents occurring or likely to occur in the country in 2021.… Continue Reading
Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There has been a massive spike in cyberattacks parallel to physical aggression, affecting many Ukrainian organizations… Continue Reading
A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading
Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in this malware cluster. Let's take a closer look at B1txor20, which… Continue Reading
APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operations that may be outside the authority of the Chinese government. Explicit… Continue Reading
Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code execution (RCE). CVE-2022-26500 and CVE-2022-26501 with CVSS scores of 9.8 are located on Veeam Distribution Services.… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even target critical sectors such as healthcare. A more proactive understanding of cyber security is… Continue Reading
ISO 27000 series and their importance ISO 27000 series consist of the standards determined by the International Organization for Standardization (ISO). It offers the best approaches for information security management systems (ISMS), focusing on controlling… Continue Reading
The Stormous ransomware group has touted itself as the actor behind some attacks since early 2022. Discussions began to revolve around some of these attacks being carried out by other threat actors, with the Stormous… Continue Reading