Latest articles from SOCRadar
SOCRadar Threat Landscape Report provides U.K. organizations with an understanding of evolving cyber threats relevant to their geographical operating locations to enable security leaders to make better decisions. The intelligence provided in this report can… Continue Reading
The Common Vulnerability Scoring System (also known as CVSS) assigns a number value (0-10) to the severity of a security vulnerability. CVSS scores are often used by security professionals as part of a vulnerability management… Continue Reading
Microsoft has released "out-of-band" emergency updates to fix various critical bugs that emerged after its updates for January. Updates have also been released for Windows Server 2019, which is not included in Microsoft's mass-released updates. Various… Continue Reading
On January 14, 2022, the Russian Federal Security Service (FSB) arrested members of the REvilransomware gang at the request of US authorities. According to a statement from the FSB, a combined operation with the Russian… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
A Security Operation Center (SOC) is a centralized function inside an organization that uses people, processes, and technology to continually monitor and enhance an organization’s security posture while preventing, detecting, analyzing, and responding to cybersecurity… Continue Reading
Cisco fixed a critical privilege escalation vulnerability, tracked as CVE-2022-20658, in Unified CCMP and Unified CCDM.On the other hand, unofficial updates have been released for the RemotePoato0 vulnerability, which Microsoft did not update. "The good news is… Continue Reading
A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems called nodes. Blockchains are decentralized networks in which no single authority controls the… Continue Reading
The second guide that we have prepared for cyber security experts and administrators is about “business intelligence”. Cybercrime has catastrophic consequences in today's corporate environment, including revenue and profit loss, brand ruin, erosion of consumer… Continue Reading
Microsoft fixes a total of 97 security vulnerabilities, including six zero-day vulnerabilities. In an update, the company announced that the critical vulnerability that emerged in the Microsoft Exchange service recently and the critical vulnerability in… Continue Reading
Welcome to the first of our ultimate guides on some topics related to cybersecurity: AI vs. cybersecurity. In these compilations, we will try to answer the questions that come to mind about some hot issues.… Continue Reading
A Linux variant of the AvosLocker gang, which first appeared in the summer of 2021 and conducted its operations in RaaS style, targeting VMware ESXi virtual machines, has emerged. AvosLocker, which carries out its VMware… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Maybe you remember the Y2K problem, a problem that refers to a computer glitch identified in some software systems that could have disrupted the transition from the year 1999 to 2000. It looks like reappeared… Continue Reading
The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an attacker utilizes human contact (social skills) to gather or compromise information about an organization… Continue Reading
A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and the web servers to filter and block malicious packages traveling back and forth… Continue Reading
Virtualization solutions continue to be one of the primary targets of cyber threats as they are widely used in companies. US-based virtualization firm VMware has fixed a critical vulnerability in some of its products. In the update… Continue Reading
Phosphorus is an attack group linked to the Iranian government, also known as Charming Kitten, Ajax Security, NewsBeef, which has been very active since 2017. Its targeting strategy aligns with Iran's Islamic Revolutionary Guard Corps. … Continue Reading
Microsoft has released an update that fixes remote desktop vulnerabilities detected on Windows Server. On January 4, in the announcement shared by the company, it was emphasized that a non-routine update was shared, and vulnerabilities should be… Continue Reading
As security threats and ransomware incidents ramp up, governments rush to keep up with this pace by developing new legislative acts, laws, and regulations. The internet has now become an integral part of everyone's daily… Continue Reading