Nov 28, 2022
Popular Platforms' User Data Leaks Could Boost Future Attack Campaigns

Popular Platforms’ User Data Leaks Could Boost Future Attack Campaigns The holiday season begins with large-scale user data leaks on popular social platforms. Given the sensitivity of the information ...

Learn More
Nov 25, 2022
What We Learned from Medibank Ransomware Incident

What We Learned from Medibank Ransomware Incident [Update] January 23, 2024: “Australian Government Imposes Sanctions on Medibank Ransomware Culprit” [Update] December 2, 2022: On December 1, 2022, th...

Learn More
Nov 25, 2022
All You Need To Know About the ManageEngine Vulnerability (CVE-2022-40...

All You Need To Know About the ManageEngine Vulnerability (CVE-2022-40300) ...

Learn More
Nov 24, 2022
91% of E-Commerce Login Traffic is Credential Stuffing Attempts

91% of E-Commerce Login Traffic is Credential Stuffing Attempts Credential stuffing is a type of cyberattack in which user login information or entire password lists are obtained through theft or leak...

Learn More
Nov 24, 2022
New ICT regulation of EU Financial Sector: DORA

New ICT regulation of EU Financial Sector: DORA by SOCRadar Research Cyber-attacks are rising worldwide, and the financial industry is among the most targeted ones. Cyber threats and attacks have beco...

Learn More
Nov 23, 2022
Gifts of the Dark Web: Auto-Generated Gift Codes

Gifts of the Dark Web: Auto-Generated Gift Codes The most popular interests of online shoppers are earning or using gift cards, reward points, and coupons. During the holiday season, e-commerce sites ...

Learn More
Nov 23, 2022
SOCRadar AttackMapper: Gartner-recommended EASM Solution

SOCRadar AttackMapper: Gartner-recommended EASM Solution The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity ma...

Learn More
Nov 22, 2022
E-Commerce Threat Landscape Report: 17.4M Credit Card Information Sold

E-Commerce Threat Landscape Report: 17.4M Credit Card Information Sold Attacks in the e-commerce industry are usually known to threaten financial information. When a user makes a payment, credit card ...

Learn More
Nov 21, 2022
The Week in Dark Web – 21 November 2022 – Access & Malicious Service S...

The Week in Dark Web – 21 November 2022 – Access & Malicious Service Sales and Data Leaks Powered by DarkMirror™ There are not always access or database sales on the dark web, although we mainly ...

Learn More
Nov 21, 2022
E-Commerce Report: Threat Actors Use HTTPS in 70% of Scams

E-Commerce Report: Threat Actors Use HTTPS in 70% of Scams E-commerce is a fragile industry, opening many doors to various attacks. Phishing is a widespread attack in this industry; in fact, e-commerc...

Learn More
Nov 17, 2022
F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities

F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities ...

Learn More
Nov 16, 2022
All You Need to Know About SandBreak Vulnerability in VM2

All You Need to Know About SandBreak Vulnerability in VM2 ...

Learn More
Nov 15, 2022
How Can SOC Analysts Benefit from Cyber Threat Intelligence?

How Can SOC Analysts Benefit from Cyber Threat Intelligence? A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the prov...

Learn More
Nov 15, 2022
FIFA World Cup 2022 Qatar: Dark Web & Phishing Landscape Analysis

FIFA World Cup 2022 Qatar: Dark Web & Phishing Landscape Analysis FIFA World Cup 2022 will be organized in Qatar from November 20 to December 18, 2022. Predictions show that 1.5 million people wi...

Learn More
Nov 14, 2022
The Week in Dark Web – 14 November 2022 – Access Sales and Data Leaks...

The Week in Dark Web – 14 November 2022 – Access Sales and Data Leaks Powered by DarkMirror™ November is the time of year when shopping sites are most targeted by threat actors. Just two weeks have pa...

Learn More
Nov 14, 2022
Manufacturing Industry Pays the Highest Average Ransom at $2.04M

Manufacturing Industry Pays the Highest Average Ransom at $2.04M The past five years have witnessed the evolution of threat actors in ransomware. These developments, both operationally and technically...

Learn More
Nov 14, 2022
Penetration Testing vs. External Attack Surface Management vs. Vulnera...

Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks,...

Learn More
Nov 13, 2022
All You Need to Know About the Latest OpenLiteSpeed Web Server Vulnera...

All You Need to Know About the Latest OpenLiteSpeed Web Server Vulnerabilities Researchers have discovered three different vulnerabilities, two of which are assigned a high severity rating and respect...

Learn More
Nov 11, 2022
What is Password Analyzer?

What is Password Analyzer? A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerab...

Learn More
Nov 10, 2022
The Ultimate OSINT Handbook on Personal Information

The Ultimate OSINT Handbook on Personal Information OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to...

Learn More