Blog

Latest articles from SOCRadar

Overview of the Internet as an Attack Vector: Censys State of The Internet Report
December 4, 2023

Overview of the Internet as an Attack Vector: Censys State of The Internet Report

The Internet is a vast network that has revolutionized our daily lives. It encompasses many technologies, including web servers, content delivery networks, and cloud computing. Web entities' content served over HTTP (like websites, web-based control… Continue Reading

November 14, 2023

SOCRadar Technical Whitepaper: ‘A 100M+ USD Negotiator’s Guide to Surviving Ransomware’

In an era where digital threats constantly evolve, ransomware attacks have emerged as a formidable challenge, holding businesses hostage and demanding astronomical ransoms. A groundbreaking whitepaper has surfaced, offering a treasure trove of strategies and… Continue Reading

Ransomware Chronicles: Unveiling the Monthly Trends in 2023
August 22, 2023

Ransomware Chronicles: Unveiling the Monthly Trends in 2023

Welcome to our “Ransomware Trends in 2023: A Live Blog of Insights and Analysis.” This live blog delves into the intricate world of ransomware, providing timely updates and valuable statistics on the prevailing trends shaping… Continue Reading

7 Lessons Learned from Cyber Attacks in the Manufacturing Industry
July 26, 2023

7 Lessons Learned from Cyber Attacks in the Manufacturing Industry

SOCRadar's Manufacturing Threat Landscape Report provides valuable insights into the manufacturing industry's cybersecurity threats and offers recommendations to strengthen your organization's security. Based on our comprehensive study and findings, several lessons have been learned that can significantly… Continue Reading

300-increase-in-the-number-of-dark-web-references-to-manufacturing-organizations
July 24, 2023

300% Increase in the Number of Dark Web References to Manufacturing Organizations

SOCRadar’s Manufacturing Threat Landscape Report is out now! This report provides valuable insights into the cybersecurity threats the manufacturing industry faces and offers recommendations to strengthen your organization's security.  Do you want to learn about: … Continue Reading

Threat Landscape in the Aviation Industry for H1 of 2023
July 18, 2023

Threat Landscape in the Aviation Industry for H1 of 2023

The aviation industry relies on interconnected networks and systems to facilitate seamless operations. Airlines, airports, manufacturers of aircraft, and numerous service providers are just a few of the many stakeholders in the complex ecosystem that… Continue Reading

Under the Spotlight State of Evolving Australian Threat Landscape in 2023
July 14, 2023

Under the Spotlight: State of Evolving Australian Threat Landscape in 2023

While cyber-attacks gain momentum in parallel with the increase in digitalization, companies operating in both public and private sectors continue to experience the effects of cyber-attacks; what is concerning, if unsurprising, is the different forms… Continue Reading

Stealing the Spotlight: Unraveling the Surge of Stealer Malware in Brazil
June 23, 2023

Stealing the Spotlight: Unraveling the Surge of Stealer Malware in Brazil

As we dive into the intricate web of the cyber threat landscape, one particular strain of malicious software continues to raise alarm bells - Stealer Malware. Over the past year, this notorious cyber predator has quietly… Continue Reading

The State of Cybersecurity in Healthcare: A Review of the Healthcare Threat Landscape Report
June 7, 2023

The State of Cybersecurity in Healthcare: A Review of SOCRadar’s Healthcare Threat Landscape Report

The cybersecurity landscape in the healthcare industry is becoming increasingly treacherous, as detailed in SOCRadar's recently published Healthcare Threat Landscape Report. This in-depth analysis illuminates the growing threat of cyber attacks, including a surge in ransomware… Continue Reading

Hacked Healthcare: Rising Security Breaches in the US
May 31, 2023

Hacked Healthcare: Rising Security Breaches in the US

The healthcare industry is an attractive, prime target for ransomware groups; the AIDS Trojan, also known as the PC Cyborg virus, was the first-ever ransomware virus documented. It targeted the healthcare industry. The AIDS trojan was… Continue Reading

Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Report
May 18, 2023

Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Report

Industry cyber threat landscape means the perspective of distinct cybersecurity threats targeting the related industry. The threat landscape of an industry could change accordingly since cyber threats constantly evolve through time. A detailed industry threat… Continue Reading

Gulf Countries Threat Landscape Report: Cyber Security Posture of the GCC Countries
May 12, 2023

Gulf Countries Threat Landscape Report: Cyber Security Posture of the GCC Countries

“Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates constitute the Cooperation Council for the Arab States of the Gulf, generally known as the Gulf Cooperation Council (GCC), a regional, intergovernmental, political, and… Continue Reading

May 11, 2023

Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in Election Campaigns

During periods of elections, people's desire to obtain knowledge is outstanding, and they are overloaded with messages varying from fliers to social media advertisements. Campaigns for candidates raise tensions, and social balances are more sensitive… Continue Reading

May 2, 2023

SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer Logs’

SOCRadar's first technical white paper is out! Here are some highlights: Threat actors created fake data to increase the number of records.  Stealer software commonly runs in the Downloads folder and AppData/temp directories.  Corporate credentials… Continue Reading

An Inherent Weakness: Critical Infrastructures in Gulf Countries
April 28, 2023

An Inherent Weakness: Critical Infrastructures in Gulf Countries

One of the most devastating cyberattacks on critical infrastructure was the Colonial Pipeline attack in the United States in May 2021. This attack caused chaos nationwide and was considered a national security threat affecting consumers, airlines, and public transportation. … Continue Reading

How to Protect Yourself from Cyber Attacks During Tax Season?
March 7, 2023

How to Protect Yourself from Cyber Attacks During Tax Season?

Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman's supervillain Joker will stay out of the way of the IRS. However, the IRS's frightening… Continue Reading

Educational Institutions Face 234% Increase in Ransomware Attacks
March 2, 2023

Educational Institutions Face 234% Increase in Ransomware Attacks

As the world becomes increasingly digital, educational institutions face a growing cyberattack threat. In 2022, cybersecurity researchers expected these attacks to increase in frequency and complexity as cybercriminals seek to exploit vulnerabilities in school systems… Continue Reading

Education Threat Landscape Report: Education Industry Threat Posts Increased by 61%
February 24, 2023

Education Threat Landscape Report: Threat Posts 61% Increased

The education industry is experiencing a digital transformation process as technology becomes more prevalent in the world. This shift is particularly relevant for students, parents, teachers, administrators, and consultants who make up the diverse user… Continue Reading

SOCRadar's End of Year Report: Phishing Threats in 2022
January 30, 2023

SOCRadar’s End of Year Report: Phishing Threats in 2022

The year 2022 was challenging for global cybersecurity, with waves of cyberattacks during Russia's invasion of Ukraine setting the tone for the rest of the year. This has also made it a challenging year for… Continue Reading

91% of E-Commerce Login Traffic is Credential Stuffing Attempts
November 24, 2022

91% of E-Commerce Login Traffic is Credential Stuffing Attempts

Credential stuffing is a type of cyberattack in which user login information or entire password lists are obtained through theft or leaks and used to log into another service. Weak and reused passwords invite credential… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo