SOCRadar® Cyber Intelligence Inc. | Campaign Alert: The Year-Long Shadow of AsyncRAT in U.S. Infrastructure
Feb 02, 2024
Campaign Alert: The Year-Long Shadow of AsyncRAT in U.S. Infrastructur...

Campaign Alert: The Year-Long Shadow of AsyncRAT in U.S. Infrastructure An AI illustration of AsyncRAT ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Harnessing SIEM Solutions With Threat Intelligence
Feb 02, 2024
Harnessing SIEM Solutions With Threat Intelligence

Harnessing SIEM Solutions With Threat Intelligence Organizations strive to implement security measures and remain current to defend against the escalating number of cyber attacks. However, staying ahe...

Learn More
SOCRadar® Cyber Intelligence Inc. | Llama Guard: A Potent Ally for Threat Detection in LLM Environments
Jan 30, 2024
Llama Guard: A Potent Ally for Threat Detection in LLM Environments

Llama Guard: A Potent Ally for Threat Detection in LLM Environments In a previous article, we delved into CyberSecEval, a benchmark created by Meta to tackle primary security concerns surrounding Larg...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Predictions: What Trends Will Be Prevalent in 2024?
Jan 30, 2024
Cybersecurity Predictions: What Trends Will Be Prevalent in 2024?

Cybersecurity Predictions: What Trends Will Be Prevalent in 2024? The evolving digital environment and expanding attack surface demand vigilant adaptation to stay one step ahead of adversaries. Recogn...

Learn More
SOCRadar® Cyber Intelligence Inc. | A for APT: Criteria for Classifying Cyber Threats
Jan 29, 2024
A for APT: Criteria for Classifying Cyber Threats

A for APT: Criteria for Classifying Cyber Threats The term “Advanced Persistent Threat” (APT) has emerged as a critical concept, necessitating a nuanced understanding and accurate classification. APTs...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 RCE Vulnerabilities Exploited in 2023
Jan 29, 2024
Top 10 RCE Vulnerabilities Exploited in 2023

Top 10 RCE Vulnerabilities Exploited in 2023 Cybersecurity unfolds in a continuous interplay between defenders and threat actors – an ever-evolving quest for software vulnerabilities, with both partie...

Learn More
SOCRadar® Cyber Intelligence Inc. | A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Onslaught
Jan 26, 2024
A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Ons...

A Review of 2023 – 26,447 CVEs, 44 Days to Exploit, and Ransomware Onslaught As we reflect on the cybersecurity journey of 2023, we uncover valuable lessons that shape our understanding of the ever-ch...

Learn More
SOCRadar® Cyber Intelligence Inc. | Stealer Malware 101: Understanding the Different Variants and Families
Jan 25, 2024
Stealer Malware 101: Understanding the Different Variants and Families

Stealer Malware 101: Understanding the Different Variants and Families In the realm of cybersecurity, malicious software (malware) continues to evolve, with various types targeting sensitive data for ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Sensitive Information in APIs and Secure Usage of Postman
Jan 23, 2024
Sensitive Information in APIs and Secure Usage of Postman

Sensitive Information in APIs and Secure Usage of Postman One of the developers’ most frequently used tools in software development is undoubtedly Postman. But what exactly are API and Postman, and ho...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is SIM Swapping?
Jan 23, 2024
What is SIM Swapping?

What is SIM Swapping? SIM swapping attacks have emerged as a formidable and increasingly prevalent challenge in the ever-evolving cyber landscape. This sophisticated form of cybercrime involves attack...

Learn More
SOCRadar® Cyber Intelligence Inc. | Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity
Jan 19, 2024
Okta Customer Support System Breach: Lessons in Supply Chain Risks and...

Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cyber Insurance in the Age of Ransomware: Protection or Provocation?
Jan 19, 2024
Cyber Insurance in the Age of Ransomware: Protection or Provocation?

Cyber Insurance in the Age of Ransomware: Protection or Provocation? Businesses are increasingly facing the threat of cybercrime, particularly ransomware. This malicious software locks users out of th...

Learn More
SOCRadar® Cyber Intelligence Inc. | Every 1 of 3 AI-Generated Code Is Vulnerable: Exploring Insights with CyberSecEval
Jan 18, 2024
Every 1 of 3 AI-Generated Code Is Vulnerable: Exploring Insights with ...

Every 1 of 3 AI-Generated Code Is Vulnerable: Exploring Insights with CyberSecEval As Artificial Intelligence (AI) technology advances, people increasingly rely on Large Language Models (LLMs) to tran...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Can OpenAI Assistant Feature Help in Vulnerability Management?
Jan 18, 2024
How Can OpenAI Assistant Feature Help in Vulnerability Management?

How Can OpenAI Assistant Feature Help in Vulnerability Management? The integration of artificial intelligence has become instrumental in fortifying defenses against evolving threats. One particularly ...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISA KEV Timeframe Problems While Prioritizing Vulnerabilities
Jan 17, 2024
CISA KEV Timeframe Problems While Prioritizing Vulnerabilities

CISA KEV Timeframe Problems While Prioritizing Vulnerabilities The escalating number of vulnerabilities in the digital landscape demands a vigilant approach from the cybersecurity community. However, ...

Learn More
SOCRadar® Cyber Intelligence Inc. | MITRE ATT&CK® v14: A New Chapter in Cybersecurity Resilience
Jan 16, 2024
MITRE ATT&CK® v14: A New Chapter in Cybersecurity Resilience

MITRE ATT&CK® v14: A New Chapter in Cybersecurity Resilience As we begin 2024, let’s take a moment to reflect on the transformative year for cybersecurity landscapes that was 2023. The MITRE ATT&a...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Intricate Relationship Between Cybercrime and Cryptocurrency
Jan 16, 2024
The Intricate Relationship Between Cybercrime and Cryptocurrency

The Intricate Relationship Between Cybercrime and Cryptocurrency In the digital age, cryptocurrency has been nothing short of revolutionary, promising a future of financial transactions that are faste...

Learn More
SOCRadar® Cyber Intelligence Inc. | EU’s Proposed Reform: Article 45.2 May Allow Member Countries to Decrypt Traffic
Jan 15, 2024
EU’s Proposed Reform: Article 45.2 May Allow Member Countries to Decry...

EU’s Proposed Reform: Article 45.2 May Allow Member Countries to Decrypt Traffic The European Union‘s proposed legal reforms have sparked a significant debate among cybersecurity experts, industry org...

Learn More
SOCRadar® Cyber Intelligence Inc. | Implementing Cyber Threat Intelligence in Software Development Lifecycle (SDLC) Pipelines
Jan 12, 2024
Implementing Cyber Threat Intelligence in Software Development Lifecyc...

Implementing Cyber Threat Intelligence in Software Development Lifecycle (SDLC) Pipelines The process of creating, refining, and deploying software, encapsulated within the Software Development Lifecy...

Learn More
SOCRadar® Cyber Intelligence Inc. | Custom GPTs: A Case of Malware Analysis and IoC Analyzing
Jan 09, 2024
Custom GPTs: A Case of Malware Analysis and IoC Analyzing

Custom GPTs: A Case of Malware Analysis and IoC Analyzing On November 6, 2023, CustomGPTs, a new feature that OpenAI stated on its blog, became available. We can already say that the emergence of Cust...

Learn More