Blog

Latest articles from SOCRadar

UAE Threat Landscape Report
March 29, 2022

SOCRadar UAE Threat Landscape Report: Runner-up for the Top 10 Targeted Countries

SOCRadar's Threat Landscape Report provides a broad perspective on cyber incidents across various countries. Our new report is on cyber-hazard trends for the UAE. Read our report for a proactive understanding of corporate cybersecurity and visionary investment… Continue Reading

March 28, 2022

The Week in Dark Web – 28 March 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

March 28, 2022

Anonymous Threatened Western Companies Operating in Russia Raises Concerns of Cyber Attack

Global hacktivist group Anonymous has threatened a list of companies that continue to operate in Russia, unlike many Western companies that suspended doing business due to Moscow’s decision to invade Ukraine. In a tweet post from… Continue Reading

What is Extended Threat Intelligence and How Does it Make a Difference?
March 28, 2022

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?

Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading

How to Identify Spear Phishing?
March 25, 2022

How to Identify Spear Phishing?

Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading

Automotive Industry Under Ransomware Attacks
March 25, 2022

Automotive Industry Under Ransomware Attacks

Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. According to a recent analysis on threat trends, about half of the top 100 manufacturers are… Continue Reading

Telegram: A New Place for Hackers
March 24, 2022

Telegram: A New Place for Hackers

One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading

What is Cybersecurity in 2022?
March 23, 2022

Let’s Start from the Beginning: What is Cybersecurity in 2022?

The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as IT security, prevent threats to networked systems and applications, whether they come from within or… Continue Reading

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak
March 22, 2022

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak

The Lapsus$ group has announced that they are responsible for authentication service provider Okta's digital breach. Threat actors posted screenshots on their Telegram channel, showing the internal system.  Cyber security experts think that the attack… Continue Reading

March 21, 2022

The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

AvosLocker Ransomware
March 21, 2022

Dark Web Profile: AvosLocker Ransomware

AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, striking attacks began to occur. The group, which operates as a ransomware-as-a-service (RaaS),… Continue Reading

How Can Reinforce Your Brand Protection Against Cyber Threats
March 21, 2022

How Can Reinforce Your Brand Protection Against Cyber Threats?

The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must confront to secure essential and sensitive corporate data. Companies must discover brand protection solutions to mitigate their growing exposure to cyber-related… Continue Reading

Azerbaijan Threat Landscape Report
March 18, 2022

SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for Threat Actors

Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for threat actors. The SOCRadar Threat Landscape Report provides an in-depth understanding of cyber incidents occurring or likely to occur in the country in 2021.… Continue Reading

Conti Leaks
March 18, 2022

An Overview on Conti Ransomware Leaks: Is This the End for Conti?

Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There has been a massive spike in cyberattacks parallel to physical aggression, affecting many Ukrainian organizations… Continue Reading

What Do You Need To Know About Vulnerability Intelligence
March 17, 2022

What Do You Need To Know About Vulnerability Intelligence

A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading

B1txor20 Malware Exploiting Log4J Vulnerability
March 16, 2022

B1txor20 Malware Exploiting Log4J Vulnerability

Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in this malware cluster. Let's take a closer look at B1txor20, which… Continue Reading

APT41 Double Dragon
March 15, 2022

Deep Web Profile: APT41/Double Dragon

APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operations that may be outside the authority of the Chinese government. Explicit… Continue Reading

Veeam Vulnerabilities Discovered
March 15, 2022

Critical RCE Vulnerabilities Discovered in Veeam Backup & Replication

Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code execution (RCE). CVE-2022-26500 and CVE-2022-26501 with CVSS scores of 9.8 are located on Veeam Distribution Services.… Continue Reading

March 14, 2022

The Week in Dark Web – 14 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

what-should-we-learn-from-the-conti-hse-ireland-attack
March 11, 2022

What Should We Learn From the Conti’s HSE Ireland Attack?

Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even target critical sectors such as healthcare. A more proactive understanding of cyber security is… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo