Blog

Latest articles from SOCRadar

Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue
April 15, 2022

Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue

The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity experts. A patch was released on April Patch Tuesday for the vulnerability with CVE-2022-26809 and a CVSS score… Continue Reading

‘Fullz,’ ‘Dumps,’ and More: What are Hackers Selling on the Black Market?
April 14, 2022

‘Fullz,’ ‘Dumps,’ and More: What do Hackers Sell on the Black Market?

It’s easy to appreciate the importance hackers place on stolen bank accounts, credit cards, and social security numbers. Each of those products is a component of the ordinary person’s financial life. Its easy conversion to… Continue Reading

Top 10 Telegram Channels for Hackers
April 14, 2022

The Top 10 Dark Web Telegram Chat Groups and Channels

After the privacy policy scandal of WhatsApp in January 2021, Telegram was one of the trending apps to replace WhatsApp regarding its privacy policy. This situation makes Telegram more popular than ever before! Due to… Continue Reading

IBM X-Force Threat Intelligence Index 2022
April 13, 2022

IBM X-Force: Now Threat Actors are Faster and Hard to Detect

Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have changed irreversibly. Digitalization, which almost every industry has to adapt to, brought… Continue Reading

Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities
April 13, 2022

Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities

Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities. The security advisory stated that one of the two zero-days is being actively exploited. Zero-day exploited in the… Continue Reading

What is Malware as a Service?
April 12, 2022

What is Malware as a service (MaaS)?

In time, the hacker underworld creates a similar model of Software-as-a-Service (SaaS). Malware as a service and SaaS have a similar duty with one main difference; MaaS is an unlawful version of SaaS. MaaS gives… Continue Reading

Is Nginx 0-Day RCE Vulnerability False Alarm?
April 12, 2022

Is Nginx Zero-Day RCE Vulnerability False Alarm?

On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twitter account BlueHornet, which is associated with the group AgainstTheWest. The threat… Continue Reading

Android Banking Malware Octo
April 11, 2022

Android Banking Malware Octo Allows Remote Control on Infected Devices

A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions. It is thought to have been downloaded more than 50,000 times. Expressed as a new version… Continue Reading

20 SOCRadar Notifications That Will Make You Feel Safer
April 8, 2022

20 SOCRadar Notifications That Will Make You Feel Safer

SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In addition, up-to-date notifications are provided for you to follow the spotlight actively. In… Continue Reading

Most Remarkable APT Incidents Targeted Malaysia in 2021
April 7, 2022

Most Remarkable APT Incidents That Targeted Malaysia in 2021

Malaysia has rapidly integrated into the digital age with the rest of the world for the past few decades because of the exponential development of ICT infrastructure, and barely any citizen in Malaysia is unconnected… Continue Reading

Most Remarkable APT Incidents Targeted Netherlands in 2021
April 7, 2022

Most Remarkable APT Incidents That Targeted Netherlands in 2021

The Netherlands is regarded as the technological gateway to Europe. The internet economy in the Netherlands, which currently accounts for more than six percent of the country's GDP, is expected to continue to grow in… Continue Reading

What are the Biggest Cybersecurity Risks in North America?
April 6, 2022

What are the Biggest Cybersecurity Risks in North America?

The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading

Lockbit 3.0
April 6, 2022

Lockbit 3.0: Another Upgrade to World’s Most Active Ransomware

Lockbit Ransomware gang, also known as Bitwise Spider, are the cybercriminal masterminds behind the popular Lockbit Ransomware-as-a-service. They are one of the most active ransomware gangs with generally multiple victims per day, sometimes higher. On… Continue Reading

Microsoft Exchange Server Cyberattack Timeline
April 4, 2022

Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control business networks because it provides an exclusive field that could allow attackers to… Continue Reading

Borat Remote Access Trojan (RAT)
April 4, 2022

New Remote Access Trojan (RAT) named Borat on the Darknet Markets

Threat actors are developing more advanced attack techniques every day. They even help non-technical attackers by publishing toolkits. With these toolkits, anyone can easily access victims' systems remotely, perform DDoS attacks or deploy ransomware. Borat,… Continue Reading

5 Things You Should Know About the Genesis Marketplace
April 1, 2022

5 Things You Should Know About the Genesis Marketplace

The Genesis Market is an automated online store that sells credentials, fingerprints, web platform vulnerabilities, cookies, and various sensitive data that assist cybercriminal hackers in gaining initial access into the targeted victim network. Security researchers… Continue Reading

What Do You Need to Know & Do About Spring4Shell Zero-Day Vulnerability?
April 1, 2022

What Do You Need to Know About Spring4Shell Zero-Day Vulnerability?

A zero-day vulnerability that affects the Spring Core Java framework called Spring4Shell and allows RCE has been disclosed. Vulnerability coded as CVE-2022-22965 and rated as critical. Spring is a very popular framework for Java developers. This increases… Continue Reading

March 31, 2022

What Cyber Security Experts Think: How to Make Money on the Dark Web?

People increasingly purchase and sell items in the Internet's most obscure corners. Amazon, Shopify, Walmart, and eBay are all well-known e-commerce platforms. These are frequently the first internet stores where we purchase our goods. However,… Continue Reading

Lapsus$ Extortion Group
March 31, 2022

Dark Web Profile: Lapsus$ Extortion Group

The Lapsus$ group, which started its activities a short time ago, managed to attract the whole world's attention. With their high-profile target and unconventional tactics and methods, are we just facing a "new player in… Continue Reading

New Cyber Threats Require New Security Solutions: External Attack Surface Management (EASM)
March 30, 2022

CISOs Guide to External Attack Surface Management (EASM)

The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomware rose to a level affecting the lives of ordinary people directly, thanks to the… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo