
Windows Server Update Fixes Remote Desktop Issues
Windows Server Update Fixes Remote Desktop Issues Microsoft has released an update that fixes remote desktop vulnerabilities detected on Windows Server. On January 4, in the announcement sha...

Cyber Law Round-Up: SOCRadar’s Curation for Recent Cyber Legislations ...
Cyber Law Round-Up: SOCRadar’s Curation for Recent Cyber Legislations Across the World in 2021 As security threats and ransomware incidents ramp up, governments rush to keep up with this pace by devel...

Top 5 Cyber Attacks in the Asia Pacific (APAC) in 2021
Top 5 Cyber Attacks in the Asia Pacific (APAC) in 2021 As the end of the year approaches, we continue to compile the prominent cyber security news of the year specific to the regions. Address to four ...

Vulnerability Round-Up: SOCRadar's Curation of Critical Vulnerabilitie...
Vulnerability Round-Up: SOCRadar’s Curation of Critical Vulnerabilities for 2021 Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vul...

How to Minimize Your Attack Surface in 5 Ways
How to Minimize Your Attack Surface in 5 Ways Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minima...

What is a Rootkit and How to Detect It
What is a Rootkit and How to Detect It A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can a...

Top Cyber Threats to the Finance Sector in 2021
Top Cyber Threats to the Finance Sector in 2021 Threat actors are increasingly targeting financial institutions for monetary gains. SOCRadar CTIA team continuously monitors the deep and dark web sourc...

What is Operational Cyber Threat Intelligence and How to Use It
What is Operational Cyber Threat Intelligence and How to Use It Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to the success o...

Let's Start From the Beginning: What is Encryption?
Let’s Start From the Beginning: What is Encryption? Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOC...

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 20...
What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022 If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, th...

Top 5 Cyber Attacks Targeting DACH Region in 2021
Top 5 Cyber Attacks Targeting DACH Region in 2021 Germany, Austria, and Switzerland (DACH) region, home to many giant companies with advanced IoT and artificial intelligence technologies, has been und...

SOCRadar Recognized as a Threat Intelligence Representative Vendor in ...
SOCRadar Recognized as a Threat Intelligence Representative Vendor in the Latest Gartner Report SOCRadar is recognized as a Threat Intelligence Representative Vendor in Gartner’s latest reports ...

Top Cyber Attacks to Cryptocurrency Exchanges and Blockchain Companies...
Top Cyber Attacks to Cryptocurrency Exchanges and Blockchain Companies in 2021 While leaving behind the most critical vulnerability of the year, it is time to look at the issues discussed by the cyber...

What Do You Need to Know About the Log4j Critical Vulnerability and Wh...
What Do You Need to Know About the Log4j Critical Vulnerability and What Can You Do? Last update: January 4, 2021 In the last 72 hours, the entire cyber security community has focused on the crit...

How does Global Law Enforcement deal With the Ransomware Crisis?
How does Global Law Enforcement deal With the Ransomware Crisis? Ransomware attacks have been increasing in recent years. In October, more than thirty countries came together at a summit on how to tak...

What is Technical Cyber Threat Intelligence and How to Use It
What is Technical Cyber Threat Intelligence and How to Use It As cyber threats become more sophisticated, many organizations pay more attention to their security programs. Organizations of all sizes b...

What are SMB Ports?
What are SMB Ports? The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sh...

The Week in Dark Web - 6 December 2021 - Access Sales and Data Leaks
The Week in Dark Web – 6 December 2021 – Access Sales and Data Leaks Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Again, rise of ransomwar...

Top 5 Cyber Attacks in Latin America in 2021
Top 5 Cyber Attacks in Latin America in 2021 Latin America pictures the largest conglomeration of states that jointly pose remarkable economic growth. With Mexico, Brazil, Colombia, and Argentina lead...

What You Need to Know About MSPs
What You Need to Know About MSPs Managed service providers, abbreviated as MSPs, specialize in providing certain services to other companies. These services, called managed services, could be anything...