Latest articles from SOCRadar
Today's blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API documents regarding the APIs provided by SOCRadar (used depending on licenses/packages) from this link. SOCRadar,… Continue Reading
Gartner published "Quick Answer: What is the Difference Between EASM, DRPS, and SRS?" on February 21, 2022. SOCRadar was among the vendors providing more than one of the cybersecurity technologies in this report. The report… Continue Reading
If you're concerned about your online security and getting more nervous about that, that's entirely normal. Every day we hear the news about data breaches and cyber-attacks happening. Some people think that's only companies' or… Continue Reading
In 2021, we saw that deep web monitoring and cybersecurity are essential to large corporations, governments, and ordinary people. While the Log4j vulnerability allowed threat actors to attack all java-based web servers, resounding attacks such… Continue Reading
50% of Fortune 500 companies have been compromised by APTs.[1] More than 90% of intrusions aren't even discovered by the victims themselves but through third-party notification. Open Source Intelligence (OSINT) is not only useful but… Continue Reading
The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its victim over infrastructure. The diamond's vertices that lend this model… Continue Reading
Ransomware attacks are on the rise around the world. In 2021, we saw the names of various threat actors in the headlines. The revenue of 10 significant ransomware gangs that attack critical infrastructures reached $5.2… Continue Reading
Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospitals, and colleges use the company’s enterprise content firewall. Baring Private Equity Asia and Bregal… Continue Reading
Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and “phishing” are combined in the… Continue Reading
The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is referred to as intelligence cycle management. Planning and direction, collecting, processing, exploitation,… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Computers must have an IP address to communicate with each other. IP addresses are divided into ports, which means virtual buses. It means port. However, its equivalent in computer language is a bridge. Thanks to… Continue Reading
Dozens of WordPress themes and plugins hosted on a developer's website were backdoored in a supply chain attack. with malicious code in September 2021 with the goal of infecting further sites. The backdoor gave the… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
At SOCRadar LABS, we're proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surface monitoring of applications is the continuous practice of looking for vulnerabilities and anomalies that could take… Continue Reading
SOCRadar Threat Landscape Report provides U.K. organizations with an understanding of evolving cyber threats relevant to their geographical operating locations to enable security leaders to make better decisions. The intelligence provided in this report can… Continue Reading
The Common Vulnerability Scoring System (also known as CVSS) assigns a number value (0-10) to the severity of a security vulnerability. CVSS scores are often used by security professionals as part of a vulnerability management… Continue Reading
Microsoft has released "out-of-band" emergency updates to fix various critical bugs that emerged after its updates for January. Updates have also been released for Windows Server 2019, which is not included in Microsoft's mass-released updates. Various… Continue Reading
On January 14, 2022, the Russian Federal Security Service (FSB) arrested members of the REvilransomware gang at the request of US authorities. According to a statement from the FSB, a combined operation with the Russian… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading