![SOCRadar® Cyber Intelligence Inc. | Julian Assange Released, But the Leak and Extortion Era Began Long Ago](https://socradar.io/wp-content/uploads/2024/06/julian-assange-released-but-the-leak-and-extortion-era-began-long-ago.png)
Julian Assange Released, But the Leak and Extortion Era Began Long Ago
Julian Assange Released, But the Leak and Extortion Era Began Long Ago WikiLeaks founder Julian Assange has been freed in the UK after serving over five years in Belmarsh prison for what the U.S. gove...
![SOCRadar® Cyber Intelligence Inc. | Top 10 VPN Vulnerabilities (2022 – H1 2024)](https://socradar.io/wp-content/uploads/2024/06/top-10-vpn-vulnerabilities-2022-h1-2024.jpg)
Top 10 VPN Vulnerabilities (2022 – H1 2024)
Top 10 VPN Vulnerabilities (2022 – H1 2024) In the landscape of cybersecurity, VPN security has become a critical concern for organizations worldwide. Compared to 2022, there was a staggering 47% incr...
![SOCRadar® Cyber Intelligence Inc. | Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hacktivist Attacks](https://socradar.io/wp-content/uploads/2024/06/impacts-of-geopolitics-to-cyberspace-sweden-faces-intensifying-hacktivist-attacks.jpg)
Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hackti...
Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hacktivist Attacks On June 28, Salwan Momika, an Iraqi immigrant to Sweden, burned a Qur’an outside a Stockholm mosque. This act, coinci...
![SOCRadar® Cyber Intelligence Inc. | A Look at the Security Challenges Threatening E-Commerce Websites – Vulnerabilities, Skimmers, Phishing](https://socradar.io/wp-content/uploads/2024/06/a-look-at-the-security-challenges-threatening-e-commerce-websites-vulnerabilities-skimmers-phishing.jpg)
A Look at the Security Challenges Threatening E-Commerce Websites – Vu...
A Look at the Security Challenges Threatening E-Commerce Websites – Vulnerabilities, Skimmers, Phishing In the fast-paced world of e-commerce, cyber threats rise as much as the sector’s expandin...
![SOCRadar® Cyber Intelligence Inc. | The Impact of Cyber Attacks on the Stock Markets](https://socradar.io/wp-content/uploads/2024/05/the-impact-of-cyber-attacks-on-the-stock-markets.png)
The Impact of Cyber Attacks on the Stock Markets
The Impact of Cyber Attacks on the Stock Markets Today, many companies offer their shares to the public, allowing them to be traded on the stock exchange. This provides several advantages for companie...
![SOCRadar® Cyber Intelligence Inc. | Top 10 Takeaways from Verizon DBIR 2024 Report](https://socradar.io/wp-content/uploads/2024/05/top-10-takeaways-from-verizon-dbir-2024-report.jpg)
Top 10 Takeaways from Verizon DBIR 2024 Report
Top 10 Takeaways from Verizon DBIR 2024 Report Verizon’s 17th annual Data Breach Investigations Report (DBIR) for 2024 offers an in-depth look at the latest trends in data breaches and cyber security ...
![SOCRadar® Cyber Intelligence Inc. | Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations](https://socradar.io/wp-content/uploads/2024/04/compliance-through-vigilance-socradar-xti-for-compliant-organizations.jpg)
Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations
Compliance Through Vigilance; SOCRadar XTI for Compliant Organizations We are all aware that reactive measures are insufficient in this age of cyber threats; businesses must take proactive steps to ef...
![SOCRadar® Cyber Intelligence Inc. | The Importance of Supply Chain Security for Safeguarding Business Ecosystems](https://socradar.io/wp-content/uploads/2024/03/What-Do-You-Need-to-Know-How-to.-12.png)
The Importance of Supply Chain Security for Safeguarding Business Ecos...
The Importance of Supply Chain Security for Safeguarding Business Ecosystems In today’s interconnected digital ecosystem, the security of a single organization doesn’t solely depend on its internal de...
![SOCRadar® Cyber Intelligence Inc. | Defending the Inbox: Vulnerabilities of Secure Email Gateways](https://socradar.io/wp-content/uploads/2024/03/defending-the-inbox-vulnerabilities-of-secure-email-gateways.png)
Defending the Inbox: Vulnerabilities of Secure Email Gateways
Defending the Inbox: Vulnerabilities of Secure Email Gateways In an era where digital communication reigns supreme, email remains a cornerstone of modern business and personal correspondence. However,...
![SOCRadar® Cyber Intelligence Inc. | Attack Surface Management with Open-Source Tools and Services](https://socradar.io/wp-content/uploads/2024/02/attack-surface-management-with-open-source-tools-and-services.png)
Attack Surface Management with Open-Source Tools and Services
Attack Surface Management with Open-Source Tools and Services As the first line of defense against cyber attacks, adept attack surface management is critical in reducing the chance of a successful bre...
![SOCRadar® Cyber Intelligence Inc. | Top 10 Custom GPTs for Cybersecurity](https://socradar.io/wp-content/uploads/2024/01/top-10-custom-gpts-for-cybersecurity.png)
Top 10 Custom GPTs for Cybersecurity
Top 10 Custom GPTs for Cybersecurity Custom GPTs in cybersecurity represent a groundbreaking fusion of AI and information security. These specialized GPT models are tailored to address diverse cyberse...
![SOCRadar® Cyber Intelligence Inc. | Top 10 RCE Vulnerabilities Exploited in 2023](https://socradar.io/wp-content/uploads/2024/01/top-10-rce-vulnerabilities-exploited-in-2023.png)
Top 10 RCE Vulnerabilities Exploited in 2023
Top 10 RCE Vulnerabilities Exploited in 2023 Cybersecurity unfolds in a continuous interplay between defenders and threat actors – an ever-evolving quest for software vulnerabilities, with both partie...
![SOCRadar® Cyber Intelligence Inc. | CISA KEV Timeframe Problems While Prioritizing Vulnerabilities](https://socradar.io/wp-content/uploads/2024/01/cisa-kev-timeframe-problems-while-prioritizing-vulnerabilities.png)
CISA KEV Timeframe Problems While Prioritizing Vulnerabilities
CISA KEV Timeframe Problems While Prioritizing Vulnerabilities The escalating number of vulnerabilities in the digital landscape demands a vigilant approach from the cybersecurity community. However, ...
![SOCRadar® Cyber Intelligence Inc. | Enhancing IoT Security with Cyber Threat Intelligence (CTI)](https://socradar.io/wp-content/uploads/2023/12/enhancing-iot-security-with-cyber-threat-intelligence-cti-1.png)
Enhancing IoT Security with Cyber Threat Intelligence (CTI)
Enhancing IoT Security with Cyber Threat Intelligence (CTI) The Internet of Things (IoT) represents a significant technological advancement that is widely utilized in various aspects of our lives, inc...
![SOCRadar® Cyber Intelligence Inc. | Custom GPTs for Vulnerability Management: Harness the Power of AI in Cyber Defense](https://socradar.io/wp-content/uploads/2023/12/custom-gpts-for-vulnerability-management-harness-the-power-of-ai-in-cyber-defense.png)
Custom GPTs for Vulnerability Management: Harness the Power of AI in C...
Custom GPTs for Vulnerability Management: Harness the Power of AI in Cyber Defense Artificial intelligence (AI) stands as a multifaceted force, shaping the future of both defense and offense in the cy...
![SOCRadar® Cyber Intelligence Inc. | 2023 Review of the CISA Known Exploited Vulnerabilities (KEV) Catalog](https://socradar.io/wp-content/uploads/2023/11/2023-review-of-the-cisa-known-exploited-vulnerabilities-kev-catalog.png)
2023 Review of the CISA Known Exploited Vulnerabilities (KEV) Catalog
2023 Review of the CISA Known Exploited Vulnerabilities (KEV) Catalog Cybersecurity is a constant back-and-forth between the defenders and the threat actors, all centered around finding vulnerabilitie...
![SOCRadar® Cyber Intelligence Inc. | Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It?](https://socradar.io/wp-content/uploads/2023/11/predicting-vulnerability-exploitation-for-proactive-cybersecurity-whats-epss-and-how-can-svrs-enhance-it.png)
Predicting Vulnerability Exploitation for Proactive Cybersecurity: Wha...
Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It? Predicting outcomes closely before taking action is a fundamental aspect of effective decis...
![SOCRadar® Cyber Intelligence Inc. | Exploring the Top Vulnerabilities Exploited by State-Sponsored Threat Actors](https://socradar.io/wp-content/uploads/2023/11/exploring-the-top-vulnerabilities-exploited-by-state-sponsored-threat-actors.png)
Exploring the Top Vulnerabilities Exploited by State-Sponsored Threat ...
Exploring the Top Vulnerabilities Exploited by State-Sponsored Threat Actors While cyberattacks are a common concern for individuals and organizations alike, the shadowy realm of state-sponsored threa...
![SOCRadar® Cyber Intelligence Inc. | Counter-Ransomware Initiative: A United Front Against Ransomware](https://socradar.io/wp-content/uploads/2023/11/counter-ransomware-initiative-a-united-front-against-ransomware.png)
Counter-Ransomware Initiative: A United Front Against Ransomware
Counter-Ransomware Initiative: A United Front Against Ransomware [Update] November 9, 2023: Boeing was once again leaked on the victim site of the LockBit*** [Update] November 3, 2023: LockBit lists B...
![SOCRadar® Cyber Intelligence Inc. | Trick or Threat: Diving into Spooky Techniques of Ransomware Groups](https://socradar.io/wp-content/uploads/2023/10/trick-or-threat-diving-into-spooky-techniques-of-ransomware-groups.png)
Trick or Threat: Diving into Spooky Techniques of Ransomware Groups
Trick or Threat: Diving into Spooky Techniques of Ransomware Groups October, a month of chilling winds, pumpkin spice, and haunting tales, also marks Cybersecurity Awareness Month. An annual campaign,...