Blog

Latest articles from SOCRadar

April 12, 2021

The Ultimate List of Free and Open-source Threat Intelligence Feeds

Cybersecurity threats are evolving quickly, and there's no time to keep up to date on the new details for most security researchers. This is why threat intelligence is an important part of the security activities… Continue Reading

April 2, 2021

The Week in Dark Web – 02 April 2021 – Data Sale Frenzy

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. SQL Injection to Hyundai Russia, Chinese mobile app data breach, LinkedIn 100M personal data sale, 300GB of personal details… Continue Reading

March 26, 2021

The Week in Dark Web – 26 March 2021 – Grand Theft Data

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Citrix access sale, personal data sale from various organizations in tech, education, sourcing, and intrusion detection system sale for… Continue Reading

March 19, 2021

The Week in Dark Web – 19 March 2021 – US Law Firms On Target

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Unauthorized network access sale for Tata Communication and law firms from the US, Binance API keys database leaked, customer… Continue Reading

March 12, 2021

The Week in Dark Web – 12 March 2021 – Zero-Day Exploits and Then Some

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Database sale of an Israeli company, 2M Indonesian citizens PII data leak, Cobalt Strike new edition on sale are… Continue Reading

by
March 5, 2021

The Week in Dark Web – 05 March 2021 – Paypal & Fortune 500 Company Access Leaked

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Paypal user credentials leak, Fortune 500 company network access sale, ransomware attacks on various companies from different backgrounds like… Continue Reading

by
February 26, 2021

The Week in Dark Web – 26 February 2021 – 37M LinkedIn User Data Leaked

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Linkedin user data leak, RDP credential sales, ransomware attacks on worldwide companies and government institutions were among them Here… Continue Reading

by
February 19, 2021

The Week in Dark Web – 19 February 2021 – RDP Credential Sales on the Rise

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week, including major RDP credential sales, ransomware attacks on global corporations, and even some government organizations. Here is the breakdown… Continue Reading

by
February 15, 2021

What You Need to Know About STIX and TAXII?

STIX and TAXII were developed to improve cyber threat detection and mitigation. STIX stipulates the details of the threat, while TAXII decides the flow of information. STIX and TAXII are machine-readable and thus conveniently automated,… Continue Reading

by
February 8, 2021

CTI is So Critical to SOC Teams for DNS Security

Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per day. These statistics alone can show how critical DNS security is. Many monitoring… Continue Reading

by
January 28, 2021

Top 5 Remote Code Execution (RCE) Attacks in 2020

According to a recent report[1], more than half of the email service on the Internet were impacted by remote code execution attacks. RCE vulnerabilities are one of the most dangerous of their kind as attackers… Continue Reading

by
December 15, 2020

Sunburst/Solorigate SolarWinds Supply Chain Backdoor Attack

What you need to know Nation-state threat actors breached the supply chain of SolarWinds in order to infiltrate its customers including U.S. government agencies and Fortune 500 companies. On December 13, 2020, the security vendor… Continue Reading

by
November 12, 2020

Free Threat Intelligence Courses

Threat intelligence is an emerging concept, recently needed in all industries, to protect companies from attacks. Gathering this intelligence should be done by a separate, qualified team, however, this is still not quite the case… Continue Reading

by
November 5, 2020

OSINT for Digital Asset Discovery

OSINT(Open Source Intelligence) can be used by attackers to identify assets and gather other useful information before the attack is initiated. Asset discovery takes a constructive approach which allows companies to recognize prior risk areas.… Continue Reading

transportation
November 1, 2020

Top Threat Intelligence Use Cases for Third-Party Risks: Supply Chain Attacks

A successful third-party risk program, which includes the various third-party sectors, ought to provide threat information. Detailed vulnerability information will then be used for defined attack scenarios to map hacker workflows. A recent survey conducted… Continue Reading

by
Futuristic business investment information technology
October 29, 2020

The Role of Cyber Threat Intelligence Analyst

Who are CTI analysts? Cyber threat analysts are specialists in cyber threat, who use their analytical and technological skills to address complex cyber threat challenge issues, generate detailed reports, and brief the company on short… Continue Reading

by
fire and water fists
October 25, 2020

How To Takedown Phishing Domains for Free

Phishing - tricking people since "forever" Scammers have always existed, luring people into giving them their valuables or simply tricking them to achieve their goals. Before early technological inventions, you had to be more creative… Continue Reading

by
Digital sphere
October 22, 2020

Top Threat Intelligence Use Cases for the Insurance Industry

In the past couple of years, privacy irregularities in insurance providers have disclosed more than 100 million people's personal privacy. In general, the insurance industry faces cyber threats from both internal and external sources, including… Continue Reading

by
mobile shopping
October 18, 2020

Top Threat Intelligence Use Cases for the E-commerce Industry-II

Prevention of the landscape is no longer enough in today's cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases of… Continue Reading

by
Newsletter

powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo