Blog

Latest articles from SOCRadar

What-is-Red-Teaming-and-How-Does-It-Work
March 30, 2022

What is Red Teaming and How Does It Work?

Red Teaming is a multi-layered attack simulation that assesses how well a company's people, networks, applications, and physical security controls can survive an attack from a real-world opponent. A red teaming assessment aims to show… Continue Reading

Is Lapsus$ Extortion Group "Officially Back from Vacation"?
March 30, 2022

Is Lapsus$ Extortion Group “Officially Back from Vacation”?

The Lapsus$ group announced that they would be on vacation until March 30 after the notorious Okta attack. In the early hours of yesterday morning, the threat actor announced that they were "officially back from… Continue Reading

UAE Threat Landscape Report
March 29, 2022

SOCRadar UAE Threat Landscape Report: Runner-up for the Top 10 Targeted Countries

SOCRadar's Threat Landscape Report provides a broad perspective on cyber incidents across various countries. Our new report is on cyber-hazard trends for the UAE. Read our report for a proactive understanding of corporate cybersecurity and visionary investment… Continue Reading

March 28, 2022

The Week in Dark Web – 28 March 2022 – Access Sales and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

March 28, 2022

Anonymous Threatened Western Companies Operating in Russia Raises Concerns of Cyber Attack

Global hacktivist group Anonymous has threatened a list of companies that continue to operate in Russia, unlike many Western companies that suspended doing business due to Moscow’s decision to invade Ukraine. In a tweet post from… Continue Reading

What is Extended Threat Intelligence and How Does it Make a Difference?
March 28, 2022

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?

Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading

How to Identify Spear Phishing?
March 25, 2022

How to Identify Spear Phishing?

Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading

Automotive Industry Under Ransomware Attacks
March 25, 2022

Automotive Industry Under Ransomware Attacks

Although the automotive industry has begun to digitalize its manufacturing facilities, most businesses still treat cybersecurity as an afterthought. According to a recent analysis on threat trends, about half of the top 100 manufacturers are… Continue Reading

Telegram: A New Place for Hackers
March 24, 2022

Telegram: A New Place for Hackers

One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading

What is a Phishing Kit?
March 24, 2022

What is a Phishing Kit?

A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with little or no phishing experience to… Continue Reading

What is Cybersecurity in 2022?
March 23, 2022

Let’s Start from the Beginning: What is Cybersecurity in 2022?

The practice of securing critical systems and sensitive data from digital threats is known as cybersecurity. Cybersecurity, also known as IT security, prevent threats to networked systems and applications, whether they come from within or… Continue Reading

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak
March 22, 2022

Lapsus$ Group Allegedly Breached Okta After Microsoft Source Code Leak

The Lapsus$ group has announced that they are responsible for authentication service provider Okta's digital breach. Threat actors posted screenshots on their Telegram channel, showing the internal system.  Cyber security experts think that the attack… Continue Reading

What is EMOTET Malware and How to Protect Yourself
March 22, 2022

What is EMOTET Malware and How to Protect Yourself

According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading

March 21, 2022

The Week in Dark Web – 21 March 2022 – Ransomware Attacks and Data Leaks

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomware attacks, some database thefts, and stealing customer data, that took their place on the headlines… Continue Reading

AvosLocker Ransomware
March 21, 2022

Dark Web Profile: AvosLocker Ransomware

AvosLocker was first detected in 2021, and it usually appears as ransomware targeting Windows systems. After a variant targeting Linux environments emerged, striking attacks began to occur. The group, which operates as a ransomware-as-a-service (RaaS),… Continue Reading

How Can Reinforce Your Brand Protection Against Cyber Threats
March 21, 2022

How Can Reinforce Your Brand Protection Against Cyber Threats?

The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must confront to secure essential and sensitive corporate data. Companies must discover brand protection solutions to mitigate their growing exposure to cyber-related… Continue Reading

Azerbaijan Threat Landscape Report
March 18, 2022

SOCRadar Azerbaijan Threat Landscape Report: A Significant Target for Threat Actors

Companies in Azerbaijan are developing their technological infrastructure. This makes them ideal targets for threat actors. The SOCRadar Threat Landscape Report provides an in-depth understanding of cyber incidents occurring or likely to occur in the country in 2021.… Continue Reading

Conti Leaks
March 18, 2022

An Overview on Conti Ransomware Leaks: Is This the End for Conti?

Along with Russia’s physical invasion of Ukraine on February 24th, 2022, Russia has targeted and attacked Ukraine in cyberspace. There has been a massive spike in cyberattacks parallel to physical aggression, affecting many Ukrainian organizations… Continue Reading

What Do You Need To Know About Vulnerability Intelligence
March 17, 2022

What Do You Need To Know About Vulnerability Intelligence

A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading

B1txor20 Malware Exploiting Log4J Vulnerability
March 16, 2022

B1txor20 Malware Exploiting Log4J Vulnerability

Since the Log4J vulnerability was discovered, some other malware showed up and exploited it. B1txor20 seems to take its place among the participants in this malware cluster. Let's take a closer look at B1txor20, which… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo