
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in ...
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in Election Campaigns During periods of elections, people’s desire to obtain knowledge is outstanding, and they are overloaded ...

SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer...
SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer Logs’ SOCRadar’s first technical white paper is out! Here are some highlights: Threat actors created fake data to increase the num...

An Inherent Weakness: Critical Infrastructures in Gulf Countries
An Inherent Weakness: Critical Infrastructures in Gulf Countries One of the most devastating cyberattacks on critical infrastructure was the Colonial Pipeline attack in the United States in May 2021. ...

AI vs. AI: Future of the Cybersecurity Battles
AI vs. AI: Future of the Cybersecurity Battles Attacks and security solutions tailored with the help of artificial intelligence (AI) have become a trending subject in the security industry as AI bots ...

Major Cyberattacks in Review: March 2023
Major Cyberattacks in Review: March 2023 Cybersecurity remains a major concern for organizations of all sizes as cyberattacks become more sophisticated and frequent. Despite efforts to enhan...

How SOCRadar Can Help You with Threat Hunting?
How SOCRadar Can Help You with Threat Hunting? This article briefly explains threat hunting and SOCRadar’s ability to use the feature. If you are still reading this, we invite you to try SOCRadar XTI ...

Analysis of the Critical Infrastructure Industries From a Cybersecurit...
Analysis of the Critical Infrastructure Industries From a Cybersecurity Perspective ‘By 2024, a cyberattack will so damage critical infrastructure that a member of the G20 will reciprocate with ...

Telegram 2.0: A New Era of Privacy
Telegram 2.0: A New Era of Privacy On December 6, 2022, Telegram shared a new update blog on its blog page. In this blog post, specific topics attract attention, primarily based on privacy, and will a...

SOCRadar Announces $5M Series A Funding for New Extended Threat Intell...
SOCRadar Announces $5M Series A Funding for New Extended Threat Intelligence (XTI) Cybersecurity Platform Funding will support the expansion of SOCRadar’s single-platform early warning system that off...

Major Cyberattacks in Review: February 2023
Major Cyberattacks in Review: February 2023 As we enter March 2023, the world continues to face a surge in cyberattacks that threaten individuals, businesses, and government agencies. The last month h...

How to Protect Yourself from Cyber Attacks During Tax Season?
How to Protect Yourself from Cyber Attacks During Tax Season? Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman’s supervillain Jok...

SOCRadar is the Gold Winner of Three Cybersecurity Excellence Awards
SOCRadar is the Gold Winner of Three Cybersecurity Excellence Awards We are thrilled to announce that SOCRadar, a leading provider of cyber threat intelligence solutions, has been awarded in three cat...

Educational Institutions Face 234% Increase in Ransomware Attacks
Educational Institutions Face 234% Increase in Ransomware Attacks As the world becomes increasingly digital, educational institutions face a growing cyberattack threat. In 2022, cybersecurity research...

Growing Cybercrime Outsourcing Model: Initial Access Brokers
Growing Cybercrime Outsourcing Model: Initial Access Brokers By SOCRadar Research The initial access market has shown a dramatic increase in 2022 compared to the previous year. While SOCRadar observed...

Security Misconfigurations Caused 35% of All Time Cyber Incidents
Security Misconfigurations Caused 35% of All Time Cyber Incidents By SOCRadar Research Security misconfiguration is the vulnerability that arises when systems or applications are not configured proper...

Education Threat Landscape Report: Threat Posts 61% Increased
Education Threat Landscape Report: Threat Posts 61% Increased The education industry is experiencing a digital transformation process as technology becomes more prevalent in the world. This shift is p...

An Analysis of Emerging Fortinet Vulnerabilities Trend
An Analysis of Emerging Fortinet Vulnerabilities Trend By SOCRadar Research Fortinet is one of the major cybersecurity companies and offers 56 cybersecurity products. But, such a wide range of product...

Malware Analysis: LummaC2 Stealer
Malware Analysis: LummaC2 Stealer By SOCRadar Research [Update] November 22, 2023: Read under title: “LummaC2 v4.0 Features Anti-Sandbox Technique Employing Trigonometry and Google Cookie Revival.” [U...

Why Ransomware Groups Switch to Rust Programming Language?
Why Ransomware Groups Switch to Rust Programming Language? By SOCRadar Research The Rust programming language, which was released in 2015, became popular in a short time. Continuing to increase in pop...

Major Cyberattacks in Review: January 2023
Major Cyberattacks in Review: January 2023 Cybersecurity is a constantly changing concern because threats always evolve and adapt to new technology and trends. The first month of 2023 has seen numerou...