From Zero to Adversary: APTs
From Zero to Adversary: APTs By SOCRadar Research From time to time, news hit the front pages regarding cyberattacks on significant infrastructures, such as nuclear facilities, or major companies, suc...
Hydra Aftermath and the Future of Dark Web Marketplaces
Hydra Aftermath and the Future of Dark Web Marketplaces By SOCRadar Research Russian-speaking Hydra Market was the biggest among darknet markets, with a $1B turnover in 2020. It was also the largest n...
SOCRadar Launches New CTI Solution for SOC Analysts
SOCRadar Launches New CTI Solution for SOC Analysts Introducing CTI4SOC, SOCRadar’s stand-alone threat intelligence to meet the needs of SOC analysts. With its comprehensive ...
4 Lessons Learned from Log4Shell
4 Lessons Learned from Log4Shell By SOCRadar Research Log4Shell vulnerability shook the cyber world to its core when it first became public in December 2021. It is a zero-day vulnerability d...
5 Lessons Learned from Ransomware Attacks in 2022
5 Lessons Learned from Ransomware Attacks in 2022 By SOCRadar Research In 2022, SOCRadar researchers detected over 1700 alleged ransomware victims. The total number was approximately 29% higher than i...
SOCRadar Free Dark Web Training: Learn How to Navigate in the Shadows
SOCRadar Free Dark Web Training: Learn How to Navigate in the Shadows The concept of the dark web plays a key role in today’s increasingly complex cybercrime ecosystem. Threat actors share the dataset...
5 Lessons Learned from Data Breaches in 2022
5 Lessons Learned from Data Breaches in 2022 By SOCRadar Research Online products and services are growing daily. Consumers are entrusting more personal information to online databases, and businesses...
Major Cyber Attacks in Review: December 2022
Major Cyber Attacks in Review: December 2022 In the last month, we have seen many cyber incidents, ranging from data breaches at retailers to various cyberattacks on cryptocurrency exchange platforms....
10 Questions to ChatGPT: How It Can Change Cybersecurity
10 Questions to ChatGPT: How It Can Change Cybersecurity This blog is written with the help of OpenAI’s ChatGPT. In November 2022, OpenAI -an Artificial Intelligence research and deployment company- ...
4 Lessons Learned from Supply Chain Attacks in 2022
4 Lessons Learned from Supply Chain Attacks in 2022 At the BlackBerry Security Summit in 2022, four-fifths of IT decision-makers said they had been notified of an attack or vulnerability in ...
Increasing Cyberattacks Targeting the Gaming Industry in 2022
Increasing Cyberattacks Targeting the Gaming Industry in 2022 By SOCRadar Research The gaming industry has recently emerged as a preferred target for cyberattacks. The industry is constantly growing, ...
An Analysis of Central Banks Hackings: Who is Next?
An Analysis of Central Banks Hackings: Who is Next? By SOCRadar Research Critical infrastructures are the basis for the functioning of the countries’ system, and they are essential to continue the cou...
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022 By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching ...
Major Cyber Attacks in Review: November 2022
Major Cyber Attacks in Review: November 2022 Although the industry was relatively quiet last month, information is always valuable to both threat actors and us; in fact, it is vital. Helping you to pr...
How Can SOC Analysts Benefit from Cyber Threat Intelligence?
How Can SOC Analysts Benefit from Cyber Threat Intelligence? A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the prov...
Major Cyber Attacks in Review: October 2022
Major Cyber Attacks in Review: October 2022 Major cyberattacks of the last month include data leaks, security breaches, phishing attacks, and much more. Here are the top cyber incidents of October 202...
Major Cyber Attacks in Review: September 2022
Major Cyber Attacks in Review: September 2022 Threat actors did not sit idle throughout September. They messed with citizens of various governments, giant companies like Uber, and even the gaming indu...
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and ...
Top Cyber Threats Faced by the Aviation Industry
Top Cyber Threats Faced by the Aviation Industry The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important...
Top 10 Search Engines for Pentesters and Bug Bounty Hunters
Top 10 Search Engines for Pentesters and Bug Bounty Hunters Gathering information is the first step in identifying security vulnerabilities and analyzing risks. To collect data, security professionals...