Ara 05, 2022
Australian Approach After the Recent Cyber Attacks: Hack the Hackers

Australian Approach After the Recent Cyber Attacks: Hack the Hackers Recently, one of the attention-grabbing countries in the cyber world is Australia. However, Australia’s cyber capabilities an...

Learn More
Ara 05, 2022
Could Rackspace Incident Be Related to ProxyNotShell?

Could Rackspace Incident Be Related to ProxyNotShell? UPDATE [January 5, 2023] ...

Learn More
Ara 05, 2022
The Week in Dark Web – 5 December 2022 – Malware Sales and Data Leaks...

The Week in Dark Web – 5 December 2022 – Malware Sales and Data Leaks Powered by DarkMirror™ The sales of new services drew our attention most in the chatter of hackers last week. These tools, which t...

Learn More
Ara 02, 2022
What is the Role of Single Sign-On in Security Measures? – Part 2

What is the Role of Single Sign-On in Security Measures? – Part 2 By SOCRadar Research Read the previous article: What is the Role of Single Sign-On in Security Measures? – Part 1 Maintaining easy and...

Learn More
Ara 01, 2022
GoTo's Cloud Storage and Dev Environment Breached by Hackers

GoTo’s Cloud Storage and Dev Environment Breached by Hackers Almost all businesses have migrated to storing their assets on the cloud. Cloud computing is a great way to access your resources ins...

Learn More
Ara 01, 2022
What is the Role of Single Sign-On in Security Measures? – Part 1

What is the Role of Single Sign-On in Security Measures? – Part 1 By SOCRadar Research Identity and Access Management (IAM) can be challenging in an enterprise environment. For users and administ...

Learn More
Kas 29, 2022
Building Cybersecurity Awareness for Organizations

Building Cybersecurity Awareness for Organizations by SOCRadar Research Cybersecurity has become a vital phenomenon for every institution today, but ensuring safety is a long process that includes dif...

Learn More
Kas 28, 2022
The Week in Dark Web – 28 November 2022 – Data Leaks & Sales

The Week in Dark Web – 28 November 2022 – Data Leaks & Sales Powered by DarkMirror™ The SOCRadar research team found mostly database sales and data leaks in this week’s Dark Web Weekly. Her...

Learn More
Kas 28, 2022
Popular Platforms' User Data Leaks Could Boost Future Attack Campaigns

Popular Platforms’ User Data Leaks Could Boost Future Attack Campaigns The holiday season begins with large-scale user data leaks on popular social platforms. Given the sensitivity of the information ...

Learn More
Kas 25, 2022
What We Learned from Medibank Ransomware Incident

What We Learned from Medibank Ransomware Incident [Update] January 23, 2024: “Australian Government Imposes Sanctions on Medibank Ransomware Culprit” [Update] December 2, 2022: On December 1, 2022, th...

Learn More
Kas 25, 2022
All You Need To Know About the ManageEngine Vulnerability (CVE-2022-40...

All You Need To Know About the ManageEngine Vulnerability (CVE-2022-40300) ...

Learn More
Kas 24, 2022
91% of E-Commerce Login Traffic is Credential Stuffing Attempts

91% of E-Commerce Login Traffic is Credential Stuffing Attempts Credential stuffing is a type of cyberattack in which user login information or entire password lists are obtained through theft or leak...

Learn More
Kas 24, 2022
New ICT regulation of EU Financial Sector: DORA

New ICT regulation of EU Financial Sector: DORA by SOCRadar Research Cyber-attacks are rising worldwide, and the financial industry is among the most targeted ones. Cyber threats and attacks have beco...

Learn More
Kas 23, 2022
Gifts of the Dark Web: Auto-Generated Gift Codes

Gifts of the Dark Web: Auto-Generated Gift Codes The most popular interests of online shoppers are earning or using gift cards, reward points, and coupons. During the holiday season, e-commerce sites ...

Learn More
Kas 23, 2022
SOCRadar AttackMapper: Gartner-recommended EASM Solution

SOCRadar AttackMapper: Gartner-recommended EASM Solution The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity ma...

Learn More
Kas 22, 2022
E-Commerce Threat Landscape Report: 17.4M Credit Card Information Sold

E-Commerce Threat Landscape Report: 17.4M Credit Card Information Sold Attacks in the e-commerce industry are usually known to threaten financial information. When a user makes a payment, credit card ...

Learn More
Kas 21, 2022
The Week in Dark Web – 21 November 2022 – Access & Malicious Service S...

The Week in Dark Web – 21 November 2022 – Access & Malicious Service Sales and Data Leaks Powered by DarkMirror™ There are not always access or database sales on the dark web, although we mainly ...

Learn More
Kas 21, 2022
E-Commerce Report: Threat Actors Use HTTPS in 70% of Scams

E-Commerce Report: Threat Actors Use HTTPS in 70% of Scams E-commerce is a fragile industry, opening many doors to various attacks. Phishing is a widespread attack in this industry; in fact, e-commerc...

Learn More
Kas 17, 2022
F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities

F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities ...

Learn More
Kas 16, 2022
All You Need to Know About SandBreak Vulnerability in VM2

All You Need to Know About SandBreak Vulnerability in VM2 ...

Learn More