SOCRadar® Cyber Intelligence Inc. | The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Software
Aug 17, 2023
The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Soft...

The Wolf in Sheep’s Clothing: How Cybercriminals Abuse Legitimate Software [Update] November 9, 2023: Added FBI’s notice, see under the title: “FBI Warns of Ransomware Threats via Th...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat-Informed Defense (TID): A Threat Intelligence Perspective
Aug 04, 2023
Threat-Informed Defense (TID): A Threat Intelligence Perspective

Threat-Informed Defense (TID): A Threat Intelligence Perspective Cyberattacks are increasing in frequency worldwide, posing significant challenges for organizations as they strive to protect their cyb...

Learn More
SOCRadar® Cyber Intelligence Inc. | Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your System
Aug 03, 2023
Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your...

Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your System [Update] January 10, 2024: “Countering Living Off the Land (LOTL) Attack Methods with AI and ML” ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Black Box of GitHub Leaks: Analyzing Companies' GitHub Repos
Jul 25, 2023
The Black Box of GitHub Leaks: Analyzing Companies' GitHub Repos

The Black Box of GitHub Leaks: Analyzing Companies’ GitHub Repos This research aimed to investigate the files that companies might have accidentally uploaded to GitHub and identify any sensitive...

Learn More
SOCRadar® Cyber Intelligence Inc. | A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses
Jul 24, 2023
A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses

A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses Figure 1: Top 25 CWE logo (MITRE) The 2023 CWE Top 25 Most Dangerous Software Weaknesses is a list that ranks the most widespread and c...

Learn More
SOCRadar® Cyber Intelligence Inc. | From Azure AD to Microsoft Entra ID: Navigating the Name Change and Strengthening Phishing Defense
Jul 17, 2023
From Azure AD to Microsoft Entra ID: Navigating the Name Change and St...

From Azure AD to Microsoft Entra ID: Navigating the Name Change and Strengthening Phishing Defense Azure AD, now known as Microsoft Entra ID, is undergoing a name change announced by Microsoft on 11 J...

Learn More
SOCRadar® Cyber Intelligence Inc. | The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabilities with SOCRadar
Jul 14, 2023
The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabil...

The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabilities with SOCRadar Large Language Models (LLMs) are artificial intelligence models that generate human-like text. They have becom...

Learn More
SOCRadar® Cyber Intelligence Inc. | Ransomware Attacks on Banking Industry
Jul 12, 2023
Ransomware Attacks on Banking Industry

Ransomware Attacks on Banking Industry Due to the escalating illicit pursuits of cybercriminals seeking unlawful financial gains, particular sectors and specific types of cyber attacks tend to gain pr...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Assets Discovery Journey with SOCRadar XTI EASM
Jul 11, 2023
Navigating the Assets Discovery Journey with SOCRadar XTI EASM

Navigating the Assets Discovery Journey with SOCRadar XTI EASM The attack surface is the sum of all potential entry points an attacker can use to gain unauthorized access to an organization’s as...

Learn More
SOCRadar® Cyber Intelligence Inc. | CVSS v4.0 on the Horizon
Jul 05, 2023
CVSS v4.0 on the Horizon

CVSS v4.0 on the Horizon [Update] November 2, 2023: See the subheading “FIRST Has Released CVSS v4.0: The Next Generation of Vulnerability Scoring”  The Common Vulnerability Scoring System (CVSS) is a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management
Jun 29, 2023
Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integratio...

Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management In today’s digital landscape, the threat of cyberattacks looms large, with thre...

Learn More
SOCRadar® Cyber Intelligence Inc. | RDP Access Sales on Dark Web Forums Detected by SOCRadar
Jun 29, 2023
RDP Access Sales on Dark Web Forums Detected by SOCRadar

RDP Access Sales on Dark Web Forums Detected by SOCRadar Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using OSINT to Strengthen Organizational Security
Jun 28, 2023
Using OSINT to Strengthen Organizational Security

Using OSINT to Strengthen Organizational Security Open-source intelligence or “OSINT” is collecting and analyzing data gathered from publicly available open sources (social media, news, dark web, etc....

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring the Dark Web Job Market
Jun 28, 2023
Exploring the Dark Web Job Market

Exploring the Dark Web Job Market The dark web, notorious for its illicit activities, has evolved into a bustling marketplace for various illegal purposes. It serves as a hub for cybercriminals, offer...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Surge in Cyber Attacks on Latin American Governments
Jun 28, 2023
The Surge in Cyber Attacks on Latin American Governments

The Surge in Cyber Attacks on Latin American Governments Latin America, a region bustling with potential and promise, has witnessed a worrying trend of escalating cyber threats directed at government ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Internet-Exposed Devices within Federal Networks
Jun 27, 2023
Internet-Exposed Devices within Federal Networks

Internet-Exposed Devices within Federal Networks As technology evolves and becomes increasingly integral to all aspects of society, the need for robust cybersecurity measures becomes more pressing. On...

Learn More
SOCRadar® Cyber Intelligence Inc. | Fake Extortion: How to Tackle and How to Verify?
Jun 27, 2023
Fake Extortion: How to Tackle and How to Verify?

Fake Extortion: How to Tackle and How to Verify? Today, one of the most critical aspects of maintaining a respectable business is to have resistance against cyber attacks. To that aim, organizations t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring Cyber Threats During the Hajj Season
Jun 26, 2023
Exploring Cyber Threats During the Hajj Season

Exploring Cyber Threats During the Hajj Season “More than 2 million cyber attacks were recorded from all over the world within a month” That is the summary of the cyber struggle during the last Hajj s...

Learn More
SOCRadar® Cyber Intelligence Inc. | AWS S3 Bucket Takeover Vulnerability: Risks, Consequences, and Detection
Apr 25, 2023
AWS S3 Bucket Takeover Vulnerability: Risks, Consequences, and Detecti...

AWS S3 Bucket Takeover Vulnerability: Risks, Consequences, and Detection As the amount of data companies possesses grow, their costs can be optimized more efficiently. Thanks to the emergence of stora...

Learn More
SOCRadar® Cyber Intelligence Inc. | Customer Story: Bucket Half Empty? Half Full? Fully Public?
Feb 13, 2023
Customer Story: Bucket Half Empty? Half Full? Fully Public?

Customer Story: Bucket Half Empty? Half Full? Fully Public? In the days we live, security means not just physical security, especially in the business world. The protection of digital assets is now on...

Learn More