Danger Lurking in GitHub Repositories
Danger Lurking in GitHub Repositories By SOCRadar Research GitHub is a system that has become the world’s largest source code repository, used by %90 of Fortune 100 companies and 94 million...
Australian Approach After the Recent Cyber Attacks: Hack the Hackers
Australian Approach After the Recent Cyber Attacks: Hack the Hackers Recently, one of the attention-grabbing countries in the cyber world is Australia. However, Australia’s cyber capabilities an...
Could Rackspace Incident Be Related to ProxyNotShell?
Could Rackspace Incident Be Related to ProxyNotShell? UPDATE [January 5, 2023] ...
The Week in Dark Web – 5 December 2022 – Malware Sales and Data Leaks...
The Week in Dark Web – 5 December 2022 – Malware Sales and Data Leaks Powered by DarkMirror™ The sales of new services drew our attention most in the chatter of hackers last week. These tools, which t...
What is the Role of Single Sign-On in Security Measures? – Part 2
What is the Role of Single Sign-On in Security Measures? – Part 2 By SOCRadar Research Read the previous article: What is the Role of Single Sign-On in Security Measures? – Part 1 Maintaining easy and...
GoTo's Cloud Storage and Dev Environment Breached by Hackers
GoTo’s Cloud Storage and Dev Environment Breached by Hackers Almost all businesses have migrated to storing their assets on the cloud. Cloud computing is a great way to access your resources ins...
What is the Role of Single Sign-On in Security Measures? – Part 1
What is the Role of Single Sign-On in Security Measures? – Part 1 By SOCRadar Research Identity and Access Management (IAM) can be challenging in an enterprise environment. For users and administ...
Building Cybersecurity Awareness for Organizations
Building Cybersecurity Awareness for Organizations Cybersecurity has become a vital phenomenon for every institution today, but ensuring safety is a long process that includes different layers, and on...
The Week in Dark Web – 28 November 2022 – Data Leaks & Sales
The Week in Dark Web – 28 November 2022 – Data Leaks & Sales Powered by DarkMirror™ The SOCRadar research team found mostly database sales and data leaks in this week’s Dark Web Weekly. Her...
Popular Platforms' User Data Leaks Could Boost Future Attack Campaigns
Popular Platforms’ User Data Leaks Could Boost Future Attack Campaigns The holiday season begins with large-scale user data leaks on popular social platforms. Given the sensitivity of the information ...
What We Learned from Medibank Ransomware Incident
What We Learned from Medibank Ransomware Incident [Update] January 23, 2024: “Australian Government Imposes Sanctions on Medibank Ransomware Culprit” [Update] December 2, 2022: On December 1, 2022, th...
All You Need To Know About the ManageEngine Vulnerability (CVE-2022-40...
All You Need To Know About the ManageEngine Vulnerability (CVE-2022-40300) ...
91% of E-Commerce Login Traffic is Credential Stuffing Attempts
91% of E-Commerce Login Traffic is Credential Stuffing Attempts Credential stuffing is a type of cyberattack in which user login information or entire password lists are obtained through theft or leak...
New ICT regulation of EU Financial Sector: DORA
New ICT regulation of EU Financial Sector: DORA by SOCRadar Research Cyber-attacks are rising worldwide, and the financial industry is among the most targeted ones. Cyber threats and attacks have beco...
Gifts of the Dark Web: Auto-Generated Gift Codes
Gifts of the Dark Web: Auto-Generated Gift Codes The most popular interests of online shoppers are earning or using gift cards, reward points, and coupons. During the holiday season, e-commerce sites ...
SOCRadar AttackMapper: Gartner-recommended EASM Solution
SOCRadar AttackMapper: Gartner-recommended EASM Solution The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity ma...
E-Commerce Threat Landscape Report: 17.4M Credit Card Information Sold
E-Commerce Threat Landscape Report: 17.4M Credit Card Information Sold Attacks in the e-commerce industry are usually known to threaten financial information. When a user makes a payment, credit card ...
The Week in Dark Web – 21 November 2022 – Access & Malicious Service S...
The Week in Dark Web – 21 November 2022 – Access & Malicious Service Sales and Data Leaks Powered by DarkMirror™ There are not always access or database sales on the dark web, although we mainly ...
E-Commerce Report: Threat Actors Use HTTPS in 70% of Scams
E-Commerce Report: Threat Actors Use HTTPS in 70% of Scams E-commerce is a fragile industry, opening many doors to various attacks. Phishing is a widespread attack in this industry; in fact, e-commerc...
F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities
F5 Released Hotfixes for BIG-IP and iControl REST Vulnerabilities ...