Latest articles from SOCRadar
SOCRadar's Threat Landscape Report provides a broad perspective on cyber incidents across various countries. Our new report is on cyber-hazard trends for the UAE. Read our report for a proactive understanding of corporate cybersecurity and visionary investment… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Global hacktivist group Anonymous has threatened a list of companies that continue to operate in Russia, unlike many Western companies that suspended doing business due to Moscow’s decision to invade Ukraine. In a tweet post from… Continue Reading
Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading
Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading
Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. According to a recent analysis on threat trends, about half of the top 100 manufacturers are… Continue Reading
One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading
The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as IT security, prevent threats to networked systems and applications, whether they come from within or… Continue Reading
The Lapsus$ group has announced that they are responsible for authentication service provider Okta's digital breach. Threat actors posted screenshots on their Telegram channel, showing the internal system. Cyber security experts think that the attack… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, striking attacks began to occur. The group, which operates as a ransomware-as-a-service (RaaS),… Continue Reading
The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must confront to secure essential and sensitive corporate data. Companies must discover brand protection solutions to mitigate their growing exposure to cyber-related… Continue Reading
Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for threat actors. The SOCRadar Threat Landscape Report provides an in-depth understanding of cyber incidents occurring or likely to occur in the country in 2021.… Continue Reading
Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There has been a massive spike in cyberattacks parallel to physical aggression, affecting many Ukrainian organizations… Continue Reading
A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading
Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in this malware cluster. Let's take a closer look at B1txor20, which… Continue Reading
APT41 (also known as Double Dragon) is a well-known cyber threat group that carries out Chinese state-sponsored espionage as well as financially motivated operations that may be outside the authority of the Chinese government. Explicit… Continue Reading
Veeam, a backup and cloud solutions provider, announced that it had fixed two critical vulnerabilities that allow remote code execution (RCE). CVE-2022-26500 and CVE-2022-26501 with CVSS scores of 9.8 are located on Veeam Distribution Services.… Continue Reading
Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading
Conti ransomware attacks can target almost any organization. The attack on HSE Ireland last year demonstrates that threat actors can even target critical sectors such as healthcare. A more proactive understanding of cyber security is… Continue Reading