SOCRadar Announces $5M Series A Funding for New Extended Threat Intell...
SOCRadar Announces $5M Series A Funding for New Extended Threat Intelligence (XTI) Cybersecurity Platform Funding will support the expansion of SOCRadar’s single-platform early warning system that off...
Major Cyberattacks in Review: February 2023
Major Cyberattacks in Review: February 2023 As we enter March 2023, the world continues to face a surge in cyberattacks that threaten individuals, businesses, and government agencies. The last month h...
How to Protect Yourself from Cyber Attacks During Tax Season?
How to Protect Yourself from Cyber Attacks During Tax Season? Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman’s supervillain Jok...
SOCRadar is the Gold Winner of Three Cybersecurity Excellence Awards
SOCRadar is the Gold Winner of Three Cybersecurity Excellence Awards We are thrilled to announce that SOCRadar, a leading provider of cyber threat intelligence solutions, has been awarded in three cat...
Educational Institutions Face 234% Increase in Ransomware Attacks
Educational Institutions Face 234% Increase in Ransomware Attacks As the world becomes increasingly digital, educational institutions face a growing cyberattack threat. In 2022, cybersecurity research...
Growing Cybercrime Outsourcing Model: Initial Access Brokers
Growing Cybercrime Outsourcing Model: Initial Access Brokers By SOCRadar Research The initial access market has shown a dramatic increase in 2022 compared to the previous year. While SOCRadar observed...
Security Misconfigurations Caused 35% of All Time Cyber Incidents
Security Misconfigurations Caused 35% of All Time Cyber Incidents By SOCRadar Research Security misconfiguration is the vulnerability that arises when systems or applications are not configured proper...
Education Threat Landscape Report: Threat Posts 61% Increased
Education Threat Landscape Report: Threat Posts 61% Increased The education industry is experiencing a digital transformation process as technology becomes more prevalent in the world. This shift is p...
An Analysis of Emerging Fortinet Vulnerabilities Trend
An Analysis of Emerging Fortinet Vulnerabilities Trend By SOCRadar Research Fortinet is one of the major cybersecurity companies and offers 56 cybersecurity products. But, such a wide range of product...
Malware Analysis: LummaC2 Stealer
Malware Analysis: LummaC2 Stealer By SOCRadar Research [Update] November 22, 2023: Read under title: “LummaC2 v4.0 Features Anti-Sandbox Technique Employing Trigonometry and Google Cookie Revival.” [U...
Why Ransomware Groups Switch to Rust Programming Language?
Why Ransomware Groups Switch to Rust Programming Language? By SOCRadar Research The Rust programming language, which was released in 2015, became popular in a short time. Continuing to increase in pop...
Major Cyberattacks in Review: January 2023
Major Cyberattacks in Review: January 2023 Cybersecurity is a constantly changing concern because threats always evolve and adapt to new technology and trends. The first month of 2023 has seen numerou...
Microsoft Exchange Server Vulnerability Trend in 2022
Microsoft Exchange Server Vulnerability Trend in 2022 By SOCRadar Research Microsoft Exchange Server, a widely used email and calendar server for businesses, holds critical information vital to an org...
ESXiArgs Ransomware Attack Targets VMware Servers Worldwide
ESXiArgs Ransomware Attack Targets VMware Servers Worldwide [February 9, 2023] Update: Ransomware is updated to prevent recovery solutions. Added the subheading “New Version of ESXiArgs Ransomware Pre...
Lessons Learned from Education Industry Attacks in 2022
Lessons Learned from Education Industry Attacks in 2022 By SOCRadar Research The education industry covers a diverse range of organizations, including K-12 education, higher education, private and pub...
How Can Extended Threat Intelligence Help CISO's First 100 Days?
How Can Extended Threat Intelligence Help CISO’s First 100 Days? When the expression “first 100 days” is mentioned, we all immediately think of what a leading politician has done fro...
What is Stealer as a Service?
What is Stealer as a Service? By SOCRadar Research Stealer as a service is a marketing approach in which threat actors offer to sell or lease access to information-stealer tools designed to steal...
Malicious Actors in Dark Web: December 2022 Ransomware Landscape
Malicious Actors in Dark Web: December 2022 Ransomware Landscape Ransomware is one of the more common cyberattack types in the news. Behind the scenes of ransomware, there are numerous threat actors, ...
CTI4SOC: Ultimate Solution to SOC Analyst's Biggest Challenges
CTI4SOC: Ultimate Solution to SOC Analyst’s Biggest Challenges Today’s SOC analyst has a lot to deal with. All kinds of challenges await these cybersecurity professionals, who undertake t...
Introducing Radar Pages: Major Cyber Attacks
Introducing Radar Pages: Major Cyber Attacks Cybersecurity has grown in importance as a geopolitical factor. Cyberattacks target public and private systems each day, and the variety of attac...