Latest articles from SOCRadar
Last update: January 4, 2021 In the last 72 hours, the entire cyber security community has focused on the critical vulnerability of Log4j, actively used in millions of systems. We can even see the effect of… Continue Reading
Ransomware attacks have been increasing in recent years. In October, more than thirty countries came together at a summit on how to take action in this regard. This article has compiled different legal methods used… Continue Reading
As cyber threats become more sophisticated, many organizations pay more attention to their security programs. Organizations of all sizes build security teams to deploy network solutions and address threats. A key component to the success… Continue Reading
The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sharing are just a few of the network functions enabled by SMB.… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Latin America pictures the largest conglomeration of states that jointly pose remarkable economic growth. With Mexico, Brazil, Colombia, and Argentina leading by example, Chile, Venezuela, and Peru have revealed considerable promise. In the backdrop of… Continue Reading
Managed service providers, abbreviated as MSPs, specialize in providing certain services to other companies. These services, called managed services, could be anything from IT services to transportation services. Key Partners in Digital Transformation By outsourcing… Continue Reading
By SOCRadar Research Nation-state threat actors are cyber threat groups operating in states' interests. They sabotage, engage in espionage, and steal sensitive information to supply strategic and economic information to their home countries for political… Continue Reading
The development of internet technologies has opened the door to a new area where malicious people can make some of their bad wishes come true. Since the second half of the 20th century, threat actors… Continue Reading
One of the world’s most significant open-source projects, Apache is a free and open-source cross-platform HTTP web server. Apache is responsible for handling back-and-forth communication between the server and the browser. Apache has been developed… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
An info stealer is a piece of malicious software (malware) that tries to steal your information. In most cases, this means stealing information that can make money for the cybercriminals. The standard form of info… Continue Reading
Phishing is a tactic that targets victims primarily through emails and SMS. Emails appear to be from a legitimate source, but their main objective is to steal their personal information or login credentials by using… Continue Reading
The E-Commerce Landscape Report prepared by SOCRadar analysts has been published this week. The report includes a detailed analysis of the cybersecurity threats that most impact the e-commerce sector. The threat landscape of e-commerce is… Continue Reading
The number of cyber threats against e-commerce that appeared on the darknet and the deep web continues to increase from year to year. SOCRadar has released a report that summarizes the top threats for e-commerce… Continue Reading
Since the start of the Covid-19 Pandemic, how we do business has dramatically changed. The stocks of big online retailers like Amazon, Costco, Walmart are soaring to new heights. Firms with no online presence got… Continue Reading
For many organizations, digital initiatives are a lifeline. IoT, social, machine learning, big data analytics, artificial intelligence, and augmented reality enable digital startups to streamline operations, adopt new business models, and improve customer experience, maximizing… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide your true identity on the internet. Third parties… Continue Reading
Identity and access management (IAM) is a discipline to ensure that the right people and job roles (identities) can access the tools they need in the organization. The enterprises can control employee apps without logging… Continue Reading