Sep 13, 2024
Using Artificial Intelligence in Cybersecurity (Ultimate Guide)

Using Artificial Intelligence in Cybersecurity (Ultimate Guide) Welcome to the first of our ultimate guides on cybersecurity topics, starting with artificial intelligence in cybersecurity. In these co...

Learn More
Sep 13, 2024
Fortinet Data Breach: What We Know So Far

Fortinet Data Breach: What We Know So Far On September 12, Fortinet, a prominent cybersecurity company, acknowledged a security incident involving unauthorized access to a third-party cloud-based file...

Learn More
Sep 12, 2024
What is SOCRadar's Advanced Dark Web Monitoring?

What is SOCRadar’s Advanced Dark Web Monitoring? SOCRadar’s Advanced Dark Web Monitoring is a cutting-edge cybersecurity product designed to protect organizations from the various threats emerging fro...

Learn More
Sep 11, 2024
Microsoft’s September 2024 Patch Tuesday Addresses 79 CVEs, 4 Zero-Day...

Microsoft’s September 2024 Patch Tuesday Addresses 79 CVEs, 4 Zero-Days; Critical Ivanti EPM Updates [Update] September 17, 2024: “PoC Exploit Released for Critical Ivanti EPM Vulnerability (CVE...

Learn More
Sep 11, 2024
Top 10 Trends in Phishing Attacks (2024)

Top 10 Trends in Phishing Attacks (2024) Phishing continues to evolve in 2024, posing a significant threat to both individuals and organizations. This form of social engineering is designed to deceive...

Learn More
Sep 10, 2024
Dark Web Profile: GlorySec

Dark Web Profile: GlorySec GlorySec is a hacktivist group that has quickly gained notoriety for targeting governments and institutions it deems corrupt, particularly in Russia and Venezuela at the tim...

Learn More
Sep 09, 2024
Akira Ransomware Targets SonicWall Vulnerability (CVE-2024-40766) – Im...

Akira Ransomware Targets SonicWall Vulnerability (CVE-2024-40766) – Immediate Patching Required [Update] October 4, 2024: “Majority of SonicWall Devices Remain Unpatched for CVE-2024-40766, Patc...

Learn More
Sep 09, 2024
Alleged Leaks Affect Millions: VK, BMW Hong Kong, Shopee Logistics, an...

Alleged Leaks Affect Millions: VK, BMW Hong Kong, Shopee Logistics, and More The SOCRadar Dark Web Team has uncovered several major cyber threats on the Dark Web, including the alleged database leaks ...

Learn More
Sep 06, 2024
Understanding the Components of Information Security Risk Management

Understanding the Components of Information Security Risk Management Information Security Risk Management (ISRM) plays a critical role in safeguarding sensitive data and ensuring that risks are identi...

Learn More
Sep 06, 2024
Streamlining Cloud Security Strategy to Reduce Attack Surface

Streamlining Cloud Security Strategy to Reduce Attack Surface As businesses increasingly shift their operations to the cloud, the importance of a comprehensive cloud security strategy cannot be overst...

Learn More
Sep 06, 2024
What Is Shadow SaaS and How It Increases Vulnerability to SaaS Attacks

What Is Shadow SaaS and How It Increases Vulnerability to SaaS Attacks The concept of Shadow SaaS – where employees use unauthorized Software-as-a-Service (SaaS) applications – represents a significan...

Learn More
Sep 05, 2024
How Does SOCRadar Use AI In Its Platform?

How SOCRadar Uses AI SOCRadar leverages AI technologies in three distinct ways to enhance its threat intelligence capabilities and deliver more precise and valuable insights to its customers. ...

Learn More
Sep 05, 2024
Critical Security Updates for Cisco Smart Licensing Utility & Veea...

Critical Security Updates for Cisco Smart Licensing Utility & Veeam Products [Update] October 17, 2024: CISA adds actively exploited Veeam vulnerability (CVE-2024-40711) to KEV Catalog* [Update] O...

Learn More
Sep 05, 2024
Telegram’s Uncertain Future: Hacktivist Reactions and the Potential Sh...

Telegram’s Uncertain Future: Hacktivist Reactions and the Potential Shift to New Platforms [Update] September 24, 2024: “Telegram Will Now Provide Some User Data”, “Migration Has Begun” Telegram is mo...

Learn More
Sep 04, 2024
VMware Fusion Receives Fix for a Severe Code Execution Vulnerability, ...

VMware Fusion Receives Fix for a Severe Code Execution Vulnerability, CVE-2024-38811 Recently, Broadcom has addressed a significant security vulnerability in VMware Fusion. Tracked as CVE-2024-38811, ...

Learn More
Sep 03, 2024
What is Data Loss Prevention (DLP)?

What is Data Loss Prevention (DLP)? Whether you’re dealing with private customer data, proprietary business information, or compliance-sensitive records, Data Loss Prevention (DLP) systems are essenti...

Learn More
Sep 03, 2024
Biggest Cybersecurity Attacks in Oil And Gas Extraction Industry (2023...

Biggest Cybersecurity Attacks in Oil And Gas Extraction Industry (2023-2024) The oil and gas extraction industry, a critical sector for global energy supply, has become a prime target for cyberattacks...

Learn More
Sep 03, 2024
Vote for SOCRadar: Finalist in the Computing Security Awards 2024

Vote for SOCRadar: Finalist in the Computing Security Awards 2024! We are thrilled to announce that SOCRadar has been selected as a finalist in the 2024 Computing Security Awards! Our innovative solut...

Learn More
Sep 03, 2024
SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Se...

SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS We are thrilled to announce that SOCRadar has been recognized by the Cybersecurity and Infrastructure Se...

Learn More
Sep 02, 2024
What is Endpoint Security Management

What is Endpoint Security Management Endpoint Security Management refers to the processes, tools, and strategies used to secure endpoints or entry points on end-user devices such as computers, mobile ...

Learn More