Latest articles from SOCRadar
A Linux variant of the AvosLocker gang, which first appeared in the summer of 2021 and conducted its operations in RaaS style, targeting VMware ESXi virtual machines, has emerged. AvosLocker, which carries out its VMware… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Maybe you remember the Y2K problem, a problem that refers to a computer glitch identified in some software systems that could have disrupted the transition from the year 1999 to 2000. It looks like reappeared… Continue Reading
The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an attacker utilizes human contact (social skills) to gather or compromise information about an organization… Continue Reading
A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and the web servers to filter and block malicious packages traveling back and forth… Continue Reading
Virtualization solutions continue to be one of the primary targets of cyber threats as they are widely used in companies. US-based virtualization firm VMware has fixed a critical vulnerability in some of its products. In the update… Continue Reading
Phosphorus is an attack group linked to the Iranian government, also known as Charming Kitten, Ajax Security, NewsBeef, which has been very active since 2017. Its targeting strategy aligns with Iran's Islamic Revolutionary Guard Corps. … Continue Reading
Microsoft has released an update that fixes remote desktop vulnerabilities detected on Windows Server. On January 4, in the announcement shared by the company, it was emphasized that a non-routine update was shared, and vulnerabilities should be… Continue Reading
As security threats and ransomware incidents ramp up, governments rush to keep up with this pace by developing new legislative acts, laws, and regulations. The internet has now become an integral part of everyone's daily… Continue Reading
As the end of the year approaches, we continue to compile the prominent cyber security news of the year specific to the regions. Address to four of the five most crowded populations globally, the Asia… Continue Reading
Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vulnerabilities. Prioritization based on the value to the business and exposure to the attacks is… Continue Reading
Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minimal as possible. Organizations must constantly monitor their attack surfaces to identify and… Continue Reading
A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can also infect the hardware and firmware of your… Continue Reading
Threat actors are increasingly targeting financial institutions for monetary gains. SOCRadar CTIA team continuously monitors the deep and dark web sources to gain visibility into threat actors tirelessly targeting the finance sector in 2021. We… Continue Reading
Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to the success of these initiatives is access to up-to-date cyber threat intelligence. This blog describes the… Continue Reading
Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOCRadar's "101" articles on the subject of encryption. With the most concise definition, encryption… Continue Reading
If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, then it needs a BYOD security policy. What is BYOD? Initially, employees used only company-issued devices… Continue Reading
Germany, Austria, and Switzerland (DACH) region, home to many giant companies with advanced IoT and artificial intelligence technologies, has been under significant cyber threats in recent years. Among these threats, while mobile vulnerabilities stood out… Continue Reading
SOCRadar is recognized as a Threat Intelligence Representative Vendor in Gartner's latest reports on the cybersecurity market. Technology, research, and consulting firm Gartner published the report on December 10, 2021. SOCRadar's Risk Prime and Threat… Continue Reading
While leaving behind the most critical vulnerability of the year, it is time to look at the issues discussed by the cybersecurity world throughout 2021. We have compiled the cyberattacks on the blockchain technology front,… Continue Reading