Dec 24, 2021
Top Cyber Threats to the Finance Sector in 2021

Top Cyber Threats to the Finance Sector in 2021 Threat actors are increasingly targeting financial institutions for monetary gains. SOCRadar CTIA team continuously monitors the deep and dark web sourc...

Learn More
Dec 23, 2021
What is Operational Cyber Threat Intelligence and How to Use It

What is Operational Cyber Threat Intelligence and How to Use It Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to the success o...

Learn More
Dec 22, 2021
Let's Start From the Beginning: What is Encryption?

Let’s Start From the Beginning: What is Encryption? Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOC...

Learn More
Dec 21, 2021
What is BYOD Policy?: Practices to Help Keep Your Network Secure in 20...

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022 If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, th...

Learn More
Dec 20, 2021
Top 5 Cyber Attacks Targeting DACH Region in 2021

Top 5 Cyber Attacks Targeting DACH Region in 2021 Germany, Austria, and Switzerland (DACH) region, home to many giant companies with advanced IoT and artificial intelligence technologies, has been und...

Learn More
Dec 17, 2021
SOCRadar Recognized as a Threat Intelligence Representative Vendor in ...

SOCRadar Recognized as a Threat Intelligence Representative Vendor in the Latest Gartner Report SOCRadar is recognized as a Threat Intelligence Representative Vendor in Gartner’s latest reports ...

Learn More
Dec 15, 2021
Top Cyber Attacks to Cryptocurrency Exchanges and Blockchain Companies...

Top Cyber Attacks to Cryptocurrency Exchanges and Blockchain Companies in 2021 While leaving behind the most critical vulnerability of the year, it is time to look at the issues discussed by the cyber...

Learn More
Dec 11, 2021
What Do You Need to Know About the Log4j Critical Vulnerability and Wh...

What Do You Need to Know About the Log4j Critical Vulnerability and What Can You Do? Last update: January 4, 2021 In the last 72 hours, the entire cyber security community has focused on the crit...

Learn More
Dec 10, 2021
How does Global Law Enforcement deal With the Ransomware Crisis?

How does Global Law Enforcement deal With the Ransomware Crisis? Ransomware attacks have been increasing in recent years. In October, more than thirty countries came together at a summit on how to tak...

Learn More
Dec 09, 2021
What is Technical Cyber Threat Intelligence and How to Use It

What is Technical Cyber Threat Intelligence and How to Use It As cyber threats become more sophisticated, many organizations pay more attention to their security programs. Organizations of all sizes b...

Learn More
Dec 08, 2021
What are SMB Ports?

What are SMB Ports? The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sh...

Learn More
Dec 06, 2021
The Week in Dark Web - 6 December 2021 - Access Sales and Data Leaks

The Week in Dark Web – 6 December 2021 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwar...

Learn More
Dec 06, 2021
Top 5 Cyber Attacks in Latin America in 2021

Top 5 Cyber Attacks in Latin America in 2021 Latin America pictures the largest conglomeration of states that jointly pose remarkable economic growth. With Mexico, Brazil, Colombia, and Argentina lead...

Learn More
Dec 03, 2021
What You Need to Know About MSPs

What You Need to Know About MSPs Managed service providers, abbreviated as MSPs, specialize in providing certain services to other companies. These services, called managed services, could be anything...

Learn More
Dec 02, 2021
APT Profile: Who is Lazarus Group?

APT Profile: Who is Lazarus Group? By SOCRadar Research [Update] December 12, 2023: See the subheading: “Lazarus Uses Log4Shell in Operation Blacksmith, Deploys New Malware: NineRAT, DLRAT, and Bottom...

Learn More
Dec 01, 2021
What are Botnets: 'Digital Zombie Herds’

What are Botnets: ‘Digital Zombie Herds’ The development of internet technologies has opened the door to a new area where malicious people can make some of their bad wishes come true. Since the second...

Learn More
Nov 30, 2021
What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulne...

What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability One of the world’s most significant open-source projects, Apache is a free and open-source cross-platform HTTP web server...

Learn More
Nov 29, 2021
The Week in Dark Web - 29 November 2021 - Access Sales and Data Leaks

The Week in Dark Web – 29 November 2021 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwa...

Learn More
Nov 29, 2021
Quick Facts on the World's Top InfoStealer Malware Threats

Quick Facts on the World’s Top InfoStealer Malware Threats An info stealer is a piece of malicious software (malware) that tries to steal your information. In most cases, this means stealing inf...

Learn More
Nov 24, 2021
Phishing: A Growing Threat to E-commerce

Phishing: A Growing Threat to E-commerce Phishing is a tactic that targets victims primarily through emails and SMS. Emails appear to be from a legitimate source, but their main objective is to steal ...

Learn More