Latest articles from SOCRadar
An info stealer is a piece of malicious software (malware) that tries to steal your information. In most cases, this means stealing information that can make money for the cybercriminals. The standard form of info… Continue Reading
Phishing is a tactic that targets victims primarily through emails and SMS. Emails appear to be from a legitimate source, but their main objective is to steal their personal information or login credentials by using… Continue Reading
The E-Commerce Landscape Report prepared by SOCRadar analysts has been published this week. The report includes a detailed analysis of the cybersecurity threats that most impact the e-commerce sector. The threat landscape of e-commerce is… Continue Reading
The number of cyber threats against e-commerce that appeared on the darknet and the deep web continues to increase from year to year. SOCRadar has released a report that summarizes the top threats for e-commerce… Continue Reading
Since the start of the Covid-19 Pandemic, how we do business has dramatically changed. The stocks of big online retailers like Amazon, Costco, Walmart are soaring to new heights. Firms with no online presence got… Continue Reading
For many organizations, digital initiatives are a lifeline. IoT, social, machine learning, big data analytics, artificial intelligence, and augmented reality enable digital startups to streamline operations, adopt new business models, and improve customer experience, maximizing… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide your true identity on the internet. Third parties… Continue Reading
Identity and access management (IAM) is a discipline to ensure that the right people and job roles (identities) can access the tools they need in the organization. The enterprises can control employee apps without logging… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
The attack surface is all hardware, software and cloud assets accessible from the internet that processes or stores data. All exposed IT assets, from servers to APIs, are part of the attack surface, whether or… Continue Reading
Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made by using fake or stolen credit cards. Today, with the advantages of… Continue Reading
Mobile Banking malware is a malware family consisting of malicious apps and trojans designed to infect one’s system and collect financial data, personal information and potentially steal login credentials. Over %95 of mobile malware are… Continue Reading
Phobos ransomware, first discovered in December 2018, is another notorious cyber threat that targets businesses. Unlike other cybercrime gangs that go after big hunts, the Phobos bad guys usually go after smaller firms that don't… Continue Reading
The increasing number of vulnerabilities that security teams have to deal with makes it impossible to try to remediate all critical vulnerabilities. In fact, a small number of vulnerabilities pose a disproportionately large risk, however,… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
SOCRadar defines itself as a platform providing an early warning system with extended threat intelligence. In other words, SOCRadar protects companies and start-ups by providing critical cyber intelligence about their digital assets and vulnerabilities. External… Continue Reading
Over the last few years, it has been understood explicitly that preventive cybersecurity technologies are not effective enough to secure an organization’s network. Recent major hacks prove how effortlessly cybercriminals can gain internal access to… Continue Reading
The Q3 Finance Industry Threat Landscape Report prepared by SOCRadar analysts has been published this week. The report includes a detailed analysis of the cybersecurity threats that most impact the financial industry globally. One of… Continue Reading
The Q3 Finance Industry Threat Landscape Report prepared by SOCRadar analysts has been published this week. The report includes a detailed analysis of the cybersecurity threats that most impact the financial industry globally. One of… Continue Reading