LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial ...
LockBit Responsible for 1/3 of Ransomware Attacks Targeting Financial Industry In the first eight months of 2022, the SOCRadar CTIA Team examined 1,700 ransomware threats published on dark web forums ...
A New Rising Social Engineering Trend: Callback Phishing
A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales...
The Week in Dark Web – 31 October 2022 – Data Leaks and Access Sales Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...
MFA Bypass Techniques: How Does it Work?
MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...
Halloween Special: The Spookiest Cybersecurity Stories
Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notification wa...
What Do You Need to Know About New Critical Vulnerability in OpenSSL
What Do You Need to Know About New Critical Vulnerability in OpenSSL Version 3.0.7 of OpenSSL is expected to be released on November 1 to fix a critical vulnerability that has not yet been made public...
Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer
Newly Unsealed Indictment Charges the Operator of Raccoon Infostealer On Tuesday, October 25th, 2022, a federal grand jury indictment charges a Ukrainian national, Mark Sokolovsky, 26, also known as P...
Ransomware Strikes Thailand Manufacturing Industry
Ransomware Strikes Thailand Manufacturing Industry Data leaks are a significant concern for every organization. Between September 2021 and September 2022, theft or leak of data has been a big issue fo...
Cloud Security Module: Minimize Risk of Misconfigured Buckets
Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...
22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution
22 Years Old Vulnerability in SQLite Allows Arbitrary Code Execution CVE-2022-35737 is a vulnerability caused by the “Improper Validation of Array Index.” The vulnerability has a ...
Financial Industry Shaken by DDoS Attacks
Financial Industry Shaken by DDoS Attacks Distributed denial-of-service (DDoS) attacks are one of the most common techniques along with cyber criminals. Despite being temporary, DDoS attacks can have ...
Apple Releases Patch for Exploited Zero-Day
Apple Releases Patch for Exploited Zero-Day Threat actors actively exploiting the remote code execution vulnerability tagged CVE-2022-42827. On compromised iOS devices, an application may be able...
The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks...
The Week in Dark Web – 24 October 2022 – Access Sales and Data Leaks Powered by DarkMirror™ Threat actors continued to sell databases and access to organizations’ systems on hacker forums last w...
Ursnif Malware Moving to Ransomware Operations from Bank Account Theft
Ursnif Malware Moving to Ransomware Operations from Bank Account Theft Ursnif (a.k.a. Gozi), a former banking trojan, has been repurposed as a generic backdoor. Threat actors could use the new va...
Finance Threat Landscape Report: 17.5M Credit Card Numbers Sold on Bla...
Finance Threat Landscape Report: 17.5M Credit Card Numbers Sold on Blackmarket The dark web’s levels of anonymity make it the ideal hub for all kinds of cybercrime activity. Finance is one of the crit...
Details On The Largest B2B Leak: BlueBleed
Details On The Largest B2B Leak: BlueBleed As a cyber threat intelligence company, SOCRadar’s mission is to use every possible piece of information to identify and prevent cyber threats targetin...
Collective Cyber Attacks by Hacktivists: What's Going on in Iran?
Collective Cyber Attacks by Hacktivists: What’s Going on in Iran? Iran is under the influence of a massive hacktivism attack that has recently begun and is still ongoing. The protests, which beg...
Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Si...
Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Single Misconfigured Data Bucket SOCRadar has detected that sensitive data of 65,000 entities became public because of a misconfigur...
Valuable Resources and Must-Attend Conferences for CISOs
Valuable Resources and Must-Attend Conferences for CISOs A senior-level executive known as a “CISO” is in charge of planning and executing an extensive information security program to safeguard the co...
Better Protect Your Mobile App with SOCRadar MAS Module
Better Protect Your Mobile App with SOCRadar MAS Module Threat actors use all kinds of methods to achieve their malicious goals. Mobile apps are among the most popular targets for attackers lately. Ta...