Blog

Latest articles from SOCRadar

cyberspace search engine
September 14, 2021

Top 5 Cyberspace Search Engines Used by Security Researchers

We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?… Continue Reading

September 13, 2021

The Week in Dark Web – 13 September 2021 – A Mix of Cyber Attacks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

ransomware gangs
September 9, 2021

CISA Alert: Ransomware Gangs Take Advantage of Holidays

It’s not hard to say that many security teams worldwide are understaffed and overworked. On August 31, 2021, The FBI and the CISA released an advisory: “Ransomware Awareness for Holidays and Weekends” aiming to mention… Continue Reading

socmint
September 7, 2021

How to Use SOCMINT for Better Cause?

With the increasing use of social media by private and public practitioners, advanced methods of collecting and analyzing social media data, known as Social Media Intelligence (SOCMINT) have become an important means of gathering information.… Continue Reading

how to detec bec attacks
September 2, 2021

How to Detect BEC Attacks?

1- What is a BEC attack? A Business Email Compromise (BEC) attack is a cyberattack involving the hijacking, spoofing, or impersonation of a business email address. The victim of a BEC attack receives an email… Continue Reading

August 30, 2021

The Week in Dark Web – 30 August 2021 – The Rise of Cybercrime in Asia

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

domain hijacking
August 27, 2021

How to Detect Domain Hijacking Attacks?

1- What is a Domain Hijacking Attack? Domain Hijacking (Domain Name Theft), the control of a domain name, a domain name to be changed without the permission of the original owner of the registration or… Continue Reading

domain hijacking
August 23, 2021

Detecting IoT Devices For Your Company

From smart wearables to interconnected industrial devices the IOT is becoming a larger part of our lives since the first coinage of the term in 1999 at a P&G presentation (although the idea goes far… Continue Reading

socradar blog cti
August 16, 2021

What is Strategic Cyber Intelligence and How to Use it

As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to… Continue Reading

August 13, 2021

The Week in Dark Web – 13 August 2021 – Ransomware and Database Hacking Incidents

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

socradar blog post on Lockbit ransomware
August 2, 2021

The Story of Lockbit Ransomware

After penetrating the network, the attackers take several steps to ensure that the Ransomware attack is successful. They want to infect as many systems as possible, stop business processes and urge victims to pay ransom.… Continue Reading

July 30, 2021

The Week in Dark Web – 30 July 2021 – LockBit Strikes Again

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

socradar-ssl certificate monitoring
July 26, 2021

How to Monitor Your SSL Certificates Expiration Easily and Why

SSL is a secure socket layer certificate, a small data file that establishes a secure connection between a web page and a browser. HTTPS websites use SSL certificates to secure the connection between the user's… Continue Reading

July 23, 2021

The Week in Dark Web – 23 July 2021 – Ransomware to Data Theft

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 19, 2021

The Most Dangerous of Their Kind Remote Code Execution (RCE) Attacks

 Remote Code Execution (RCE) is a class of software vulnerabilities. An RCE vulnerability allows a malicious actor to execute code of their choice over a LAN (WAN) or Internet on a remote machine. RCE belongs to… Continue Reading

July 16, 2021

The Week in Dark Web – 16 July 2021 – Incidents from the MENA Region and Mexico

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 12, 2021

An overview of Verizon’s 2021 Data Breach Investigation Report: An Overall Summary for Industries, Incident Classification Patterns and SMBs.

For adapting to the changing Cyber Threat World, you need to be aware of what is happening around your industry vector and how threat actors are changing their TTPs. Every minute, any industry or SMB… Continue Reading

July 9, 2021

The Week in Dark Web – 9 July 2021 – Access and Database

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. admin access sale, company database theft, and stealing personal data are on the rise and took their place on… Continue Reading

July 5, 2021

The What, Where & When for Effective Dark Web Threat Hunting

Many companies worldwide have implemented dark web monitoring tools to detect emerging cyber risks proactively. However, hunting threats on the dark web is an extremely skillful and accurate work to prevent discovery without your cover… Continue Reading

June 28, 2021

How to Detect Your Network is Used by Botnets Without Touching Your Systems?

Malicious bots called "bad bots" not only evolve continually, but are very specific to certain applications, such as defense providers or even evasion tactics, as the talents and degree of development for humans and bots.… Continue Reading

Newsletter

powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo