Overview of the Internet as an Attack Vector: Censys State of The Inte...
Overview of the Internet as an Attack Vector: Censys State of The Internet Report The Internet is a vast network that has revolutionized our daily lives. It encompasses many technologies, including we...
SOCRadar Technical Whitepaper: 'A 100M+ USD Negotiator's Guide to Surv...
SOCRadar Technical Whitepaper: ‘A 100M+ USD Negotiator’s Guide to Surviving Ransomware’ In an era where digital threats constantly evolve, ransomware attacks have emerged as a formidable challenge, ho...
7 Lessons Learned from Cyber Attacks in the Manufacturing Industry
7 Lessons Learned from Cyber Attacks in the Manufacturing Industry SOCRadar’s Manufacturing Threat Landscape Report provides valuable insights into the manufacturing industry’s c...
300% Increase in the Number of Dark Web References to Manufacturing Or...
300% Increase in the Number of Dark Web References to Manufacturing Organizations SOCRadar’s Manufacturing Threat Landscape Report is out now! This report provides valuable insights into the cybersecu...
Threat Landscape in the Aviation Industry for H1 of 2023
Threat Landscape in the Aviation Industry for H1 of 2023 The aviation industry relies on interconnected networks and systems to facilitate seamless operations. Airlines, airports, manufacturers of air...
Under the Spotlight: State of Evolving Australian Threat Landscape in ...
Under the Spotlight: State of Evolving Australian Threat Landscape in 2023 While cyber-attacks gain momentum in parallel with the increase in digitalization, companies operating in both public and pri...
Ransomware Chronicles: Unveiling the Monthly Trends in 2023
Ransomware Chronicles: Unveiling the Monthly Trends in 2023 Welcome to our “Ransomware Trends in 2023: A Live Blog of Insights and Analysis.” This live blog delves into the intricate world...
Stealing the Spotlight: Unraveling the Surge of Stealer Malware in Bra...
Stealing the Spotlight: Unraveling the Surge of Stealer Malware in Brazil As we dive into the intricate web of the cyber threat landscape, one particular strain of malicious software continues to rais...
The State of Cybersecurity in Healthcare: A Review of SOCRadar's Healt...
The State of Cybersecurity in Healthcare: A Review of SOCRadar’s Healthcare Threat Landscape Report The cybersecurity landscape in the healthcare industry is becoming increasingly treacherous, as deta...
Hacked Healthcare: Rising Security Breaches in the US
Hacked Healthcare: Rising Security Breaches in the US The healthcare industry is an attractive, prime target for ransomware groups; the AIDS Trojan, also known as the PC Cyborg virus, was the fir...
Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Rep...
Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Report Industry cyber threat landscape means the perspective of distinct cybersecurity threats targeting the related industry. The th...
Gulf Countries Threat Landscape Report: Cyber Security Posture of the ...
Gulf Countries Threat Landscape Report: Cyber Security Posture of the GCC Countries “Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates constitute the Cooperation Council for the...
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in ...
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in Election Campaigns During periods of elections, people’s desire to obtain knowledge is outstanding, and they are overloaded ...
SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer...
SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer Logs’ SOCRadar’s first technical white paper is out! Here are some highlights: Threat actors created fake data to increase the num...
An Inherent Weakness: Critical Infrastructures in Gulf Countries
An Inherent Weakness: Critical Infrastructures in Gulf Countries One of the most devastating cyberattacks on critical infrastructure was the Colonial Pipeline attack in the United States in May 2021. ...
How to Protect Yourself from Cyber Attacks During Tax Season?
How to Protect Yourself from Cyber Attacks During Tax Season? Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman’s supervillain Jok...
Educational Institutions Face 234% Increase in Ransomware Attacks
Educational Institutions Face 234% Increase in Ransomware Attacks As the world becomes increasingly digital, educational institutions face a growing cyberattack threat. In 2022, cybersecurity research...
Education Threat Landscape Report: Threat Posts 61% Increased
Education Threat Landscape Report: Threat Posts 61% Increased The education industry is experiencing a digital transformation process as technology becomes more prevalent in the world. This shift is p...
SOCRadar's End of Year Report: Phishing Threats in 2022
SOCRadar’s End of Year Report: Phishing Threats in 2022 The year 2022 was challenging for global cybersecurity, with waves of cyberattacks during Russia’s invasion of Ukraine setting the t...
91% of E-Commerce Login Traffic is Credential Stuffing Attempts
91% of E-Commerce Login Traffic is Credential Stuffing Attempts Credential stuffing is a type of cyberattack in which user login information or entire password lists are obtained through theft or leak...