Oct 31, 2022
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales...

The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...

Learn More
Oct 31, 2022
MFA Bypass Techniques: How Does it Work?

MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...

Learn More
Oct 31, 2022
Halloween Special: The Spookiest Cybersecurity Stories

Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notificat...

Learn More
Oct 28, 2022
What Do You Need to Know About New Critical Vulnerability in OpenSSL

What Do You Need to Know About New Critical Vulnerability in OpenSSL Version 3.0.7 of OpenSSL is expected to be released on November 1 to fix a critical vulnerability that has not yet been made public...

Learn More
Oct 28, 2022
Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer

Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer On Tuesday, October 25th, 2022, a federal grand jury indictment charges a Ukrainian national, Mark Sokolovsky, 26, also known as P...

Learn More
Oct 27, 2022
Ransomware Strikes Thailand Manufacturing Industry

Ransomware Strikes Thailand Manufacturing Industry Data leaks are a significant concern for every organization. Between September 2021 and September 2022, theft or leak of data has been a big issue fo...

Learn More
Oct 26, 2022
Cloud Security Module: Minimize Risk of Misconfigured Buckets

Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...

Learn More
Oct 26, 2022
22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution

22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution CVE-2022-35737 is a vulnerability caused by the “Improper Validation of Array Index.” The vulnerability has a ...

Learn More
Oct 25, 2022
Financial Industry Shaken by DDoS Attacks

Financial Industry Shaken by DDoS Attacks Distributed denial-of-service (DDoS) attacks are one of the most common techniques along with cyber criminals. Despite being temporary, DDoS attacks can have ...

Learn More
Oct 25, 2022
Apple Releases Patch for Exploited Zero-Day

Apple Releases Patch for Exploited Zero-Day Threat actors actively exploiting the remote code execution vulnerability tagged CVE-2022-42827. On compromised iOS devices, an application may be able...

Learn More
Oct 24, 2022
The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks...

The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...

Learn More
Oct 21, 2022
Ursnif Malware Moving to Ransomware Operations from Bank Account Theft

Ursnif Malware Moving to Ransomware Operations from Bank Account Theft Ursnif (a.k.a. Gozi), a former banking trojan, has been repurposed as a generic backdoor. Threat actors could use the new va...

Learn More
Oct 21, 2022
Finance Threat Landscape Report: 17.5M Credit Card Numbers Sold on Bla...

Finance Threat Landscape Report: 17.5M Credit Card Numbers Sold on Blackmarket The dark web’s levels of anonymity make it the ideal hub for all kinds of cybercrime activity. Finance is one of th...

Learn More
Oct 20, 2022
Details On The Largest B2B Leak: BlueBleed

Details On The Largest B2B Leak: BlueBleed As a cyber threat intelligence company, SOCRadar’s mission is to use every possible piece of information to identify and prevent cyber threats targetin...

Learn More
Oct 20, 2022
Collective Cyber Attacks by Hacktivists: What's Going on in Iran?

Collective Cyber Attacks by Hacktivists: What’s Going on in Iran? Iran is under the influence of a massive hacktivism attack that has recently begun and is still ongoing. The protests, which beg...

Learn More
Oct 19, 2022
Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Si...

Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Single Misconfigured Data Bucket SOCRadar has detected that sensitive data of 65,000 entities became public because of a misconfigur...

Learn More
Oct 18, 2022
Valuable Resources and Must-Attend Conferences for CISOs

Valuable Resources and Must-Attend Conferences for CISOs A senior-level executive known as a “CISO” is in charge of planning and executing an extensive information security program to safe...

Learn More
Oct 18, 2022
Better Protect Your Mobile App with SOCRadar MAS Module

Better Protect Your Mobile App with SOCRadar MAS Module Threat actors use all kinds of methods to achieve their malicious goals. Mobile apps are among the most popular targets for attackers lately. Ta...

Learn More
Oct 17, 2022
What is Data Loss Prevention (DLP)? [Ultimate Guide]

What is Data Loss Prevention (DLP)? [Ultimate Guide] Data loss prevention (DLP) prohibits users on a business network from transferring sensitive data outside of the network. DLP systems assist networ...

Learn More
Oct 14, 2022
What are the Different Methods of Threat Detection?

What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...

Learn More