Free Trial
Dark Web Report
Jul 11, 2022
10 Best SIEM Tools, Products & Providers List

10 Best SIEM Tools, Products & Providers List SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve ...

Learn More
Jul 11, 2022
Dark Web Stories: Traditional Article Competition

Dark Web Stories: Traditional Article Competition One can find various sites inaccessible from the surface web on the dark web, including black markets, leak sites, hacker forums, and many more sites,...

Learn More
Jul 08, 2022
Major Cyber Attacks in Review: June 2022

Major Cyber Attacks in Review: June 2022 You can follow the major cyber security attacks of each month on SOCRadar’s “Radar” page! We experienced critical days last month due to...

Learn More
Jul 08, 2022
Checkmate Ransomware Targets QNAP SMB Services 

Checkmate Ransomware Targets QNAP SMB Services  New Checkmate ransomware has been discovered targeting QNAP NAS devices. Although the attacks are still being investigated, it is known that these new r...

Learn More
Jul 07, 2022
Under the Spotlight: RAMP Forum 

Under the Spotlight: RAMP Forum  In July 2021, a new Russian-speaking forum called RAMP, Russian Anonymous Market Place, which attracts a lot of interest from researchers and cybercriminals, was forme...

Learn More
Jul 07, 2022
Brute Ratel Utilized By Threat Actors In New Ransomware Operations

Brute Ratel Utilized By Threat Actors In New Ransomware Operations When Brute Ratel first appeared in the wild, almost no security solutions could detect it. To avoid being discovered by EDR and antiv...

Learn More
Jul 06, 2022
NPM Packages Used In A Supply Chain Attack 

NPM Packages Used In A Supply Chain Attack  Hundreds of desktop applications and websites were compromised by an NPM supply chain attack that started in December 2021, using malicious NPM packages wit...

Learn More
Jul 06, 2022
Top 5 Phishing Resources for SOC Teams

Top 5 Phishing Resources for SOC Teams Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to ...

Learn More
Jul 06, 2022
RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers

RedAlert Ransomware Targets Windows and Linux VMware ESXi Servers RedAlert is a new ransomware operation aiming to encrypt Windows and Linux VMWare ESXi servers on corporate networks using the NTRUEnc...

Learn More
Jul 06, 2022
AstraLocker Shut Down Their Operations and Released Decryptor

AstraLocker Shut Down Their Operations and Released Decryptor A ransomware gang AstraLocker, recently announced they are shutting down their operations and shared decryptors related to all the campaig...

Learn More
Jul 05, 2022
Top 5 Tactics Threat Actors Use for Initial Access

Top 5 Tactics Threat Actors Use for Initial Access A short while ago, combined security advice released by several national cybersecurity agencies highlighted the top ten attack vectors most used by t...

Learn More
Jul 04, 2022
What are DevOps, DevSecOps, and Rugged DevOps?

What are DevOps, DevSecOps, and Rugged DevOps? We are hearing these two buzzwords, DevSecOps and DevOps, more frequently. For example, Gartner predicts DevSecOps will reach mainstream adoption within ...

Learn More
Jul 04, 2022
Hundreds of Windows Networks are Infected with Raspberry Robin Worm

Hundreds of Windows Networks are Infected with Raspberry Robin Worm [Update] February 12, 2024: “Raspberry Robin Malware Advances with New One-Day Exploits” Microsoft reported that hundred...

Learn More
Jul 04, 2022
SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted ...

SOCRadar Denmark Threat Landscape Report: 9 Danish Companies Targeted Every 9 Days Cybercrime is a threat that closely concerns public authorities, companies, and residents in Denmark, as it is around...

Learn More
Jun 29, 2022
SOCRadar Singapore Threat Landscape Report: Excessive Increase in Cybe...

SOCRadar Singapore Threat Landscape Report: Excessive Increase in Cyberattack Attempts The cyber security agenda is shaken every day with brand-new threats and methods developed by malicious actors. W...

Learn More
Jun 29, 2022
New Version of Raccoon Stealer Released

New Version of Raccoon Stealer Released The new version of Raccoon Stealer has been released. The first version was first seen in 2019 and served as MaaS (malware-as-a-service.) The malware ceased ope...

Learn More
Jun 28, 2022
What is Network Performance Monitoring (NPM)?

What is Network Performance Monitoring (NPM)? Network Performance Monitoring (NPM) is assessing the service quality of a network as experienced by users by measuring, visualizing, monitoring, diagnosi...

Learn More
Jun 28, 2022
New Banking Trojan Revive Targets BBVA Customers

New Banking Trojan Revive Targets BBVA Customers The newly emerged Android banking trojan Revive mimics BBVA bank’s two-factor authentication app. Although still in early development, the m...

Learn More
Jun 27, 2022
Malicious Python Packages Steal AWS Keys

Malicious Python Packages Steal AWS Keys Cybersecurity researchers have discovered that some Python packages available in the PyPI repositories engage in malicious activity. Malicious packets send som...

Learn More
Jun 24, 2022
Threat Actors Target VMware Servers by Exploiting Log4Shell Vulnerabil...

Threat Actors Target VMware Servers by Exploiting Log4Shell Vulnerability The Log4Shell RCE vulnerability with code CVE-2021-44228 continues to be exploited by state-backed threat actors. Attackers ut...

Learn More