Latest articles from SOCRadar
The Internet is a vast network that has revolutionized our daily lives. It encompasses many technologies, including web servers, content delivery networks, and cloud computing. Web entities' content served over HTTP (like websites, web-based control… Continue Reading
In an era where digital threats constantly evolve, ransomware attacks have emerged as a formidable challenge, holding businesses hostage and demanding astronomical ransoms. A groundbreaking whitepaper has surfaced, offering a treasure trove of strategies and… Continue Reading
Welcome to our “Ransomware Trends in 2023: A Live Blog of Insights and Analysis.” This live blog delves into the intricate world of ransomware, providing timely updates and valuable statistics on the prevailing trends shaping… Continue Reading
SOCRadar's Manufacturing Threat Landscape Report provides valuable insights into the manufacturing industry's cybersecurity threats and offers recommendations to strengthen your organization's security. Based on our comprehensive study and findings, several lessons have been learned that can significantly… Continue Reading
SOCRadar’s Manufacturing Threat Landscape Report is out now! This report provides valuable insights into the cybersecurity threats the manufacturing industry faces and offers recommendations to strengthen your organization's security. Do you want to learn about: … Continue Reading
The aviation industry relies on interconnected networks and systems to facilitate seamless operations. Airlines, airports, manufacturers of aircraft, and numerous service providers are just a few of the many stakeholders in the complex ecosystem that… Continue Reading
While cyber-attacks gain momentum in parallel with the increase in digitalization, companies operating in both public and private sectors continue to experience the effects of cyber-attacks; what is concerning, if unsurprising, is the different forms… Continue Reading
As we dive into the intricate web of the cyber threat landscape, one particular strain of malicious software continues to raise alarm bells - Stealer Malware. Over the past year, this notorious cyber predator has quietly… Continue Reading
The cybersecurity landscape in the healthcare industry is becoming increasingly treacherous, as detailed in SOCRadar's recently published Healthcare Threat Landscape Report. This in-depth analysis illuminates the growing threat of cyber attacks, including a surge in ransomware… Continue Reading
The healthcare industry is an attractive, prime target for ransomware groups; the AIDS Trojan, also known as the PC Cyborg virus, was the first-ever ransomware virus documented. It targeted the healthcare industry. The AIDS trojan was… Continue Reading
Industry cyber threat landscape means the perspective of distinct cybersecurity threats targeting the related industry. The threat landscape of an industry could change accordingly since cyber threats constantly evolve through time. A detailed industry threat… Continue Reading
“Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates constitute the Cooperation Council for the Arab States of the Gulf, generally known as the Gulf Cooperation Council (GCC), a regional, intergovernmental, political, and… Continue Reading
During periods of elections, people's desire to obtain knowledge is outstanding, and they are overloaded with messages varying from fliers to social media advertisements. Campaigns for candidates raise tensions, and social balances are more sensitive… Continue Reading
SOCRadar's first technical white paper is out! Here are some highlights: Threat actors created fake data to increase the number of records. Stealer software commonly runs in the Downloads folder and AppData/temp directories. Corporate credentials… Continue Reading
One of the most devastating cyberattacks on critical infrastructure was the Colonial Pipeline attack in the United States in May 2021. This attack caused chaos nationwide and was considered a national security threat affecting consumers, airlines, and public transportation. … Continue Reading
Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman's supervillain Joker will stay out of the way of the IRS. However, the IRS's frightening… Continue Reading
As the world becomes increasingly digital, educational institutions face a growing cyberattack threat. In 2022, cybersecurity researchers expected these attacks to increase in frequency and complexity as cybercriminals seek to exploit vulnerabilities in school systems… Continue Reading
The education industry is experiencing a digital transformation process as technology becomes more prevalent in the world. This shift is particularly relevant for students, parents, teachers, administrators, and consultants who make up the diverse user… Continue Reading
The year 2022 was challenging for global cybersecurity, with waves of cyberattacks during Russia's invasion of Ukraine setting the tone for the rest of the year. This has also made it a challenging year for… Continue Reading
Credential stuffing is a type of cyberattack in which user login information or entire password lists are obtained through theft or leaks and used to log into another service. Weak and reused passwords invite credential… Continue Reading