Underground Fully UnDetectable (FUD) Crypter Market
Underground Fully UnDetectable (FUD) Crypter Market The rapidly evolving threats in the field of cybersecurity are being met with sophisticated methods such as “FUD” (Fully UnDetectable) crypters, whi...
Threat Landscape in the Aviation Industry for H1 of 2023
Threat Landscape in the Aviation Industry for H1 of 2023 The aviation industry relies on interconnected networks and systems to facilitate seamless operations. Airlines, airports, manufacturers of air...
From Azure AD to Microsoft Entra ID: Navigating the Name Change and St...
From Azure AD to Microsoft Entra ID: Navigating the Name Change and Strengthening Phishing Defense Azure AD, now known as Microsoft Entra ID, is undergoing a name change announced by Microsoft on 11 J...
Under the Spotlight: State of Evolving Australian Threat Landscape in ...
Under the Spotlight: State of Evolving Australian Threat Landscape in 2023 While cyber-attacks gain momentum in parallel with the increase in digitalization, companies operating in both public and pri...
The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabil...
The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabilities with SOCRadar Large Language Models (LLMs) are artificial intelligence models that generate human-like text. They have becom...
Ransomware Attacks on Banking Industry
Ransomware Attacks on Banking Industry Due to the escalating illicit pursuits of cybercriminals seeking unlawful financial gains, particular sectors and specific types of cyber attacks tend to gain pr...
Major Cyberattacks in Review: June 2023
Major Cyberattacks in Review: June 2023 In today’s interconnected world, cybersecurity incidents, including the entrance of major cyberattacks in June 2023, have become an unfortunate reality, a...
Ransomware Chronicles: Unveiling the Monthly Trends in 2023
Ransomware Chronicles: Unveiling the Monthly Trends in 2023 Welcome to our “Ransomware Trends in 2023: A Live Blog of Insights and Analysis.” This live blog delves into the intricate world...
CVSS v4.0 on the Horizon
CVSS v4.0 on the Horizon [Update] November 2, 2023: See the subheading “FIRST Has Released CVSS v4.0: The Next Generation of Vulnerability Scoring” The Common Vulnerability Scoring System (CVSS) is a...
Credential Theft Attacks Surge: Microsoft Raises Red Flag on Midnight ...
Credential Theft Attacks Surge: Microsoft Raises Red Flag on Midnight Blizzard (APT29) Microsoft has identified Midnight Blizzard, a Russian state-affiliated hacking group also known as APT29, as the ...
Stealing the Spotlight: Unraveling the Surge of Stealer Malware in Bra...
Stealing the Spotlight: Unraveling the Surge of Stealer Malware in Brazil As we dive into the intricate web of the cyber threat landscape, one particular strain of malicious software continues to rais...
Journey into the Top 10 Vulnerabilities Used by Ransomware Groups
Journey into the Top 10 Vulnerabilities Used by Ransomware Groups Once upon a time, in cyberspace, a menacing threat emerged. It would forever change the landscape of digital security. This threat was...
Investigating APT Groups' Attempts to Reuse Old Threat Indicators
Investigating APT Groups’ Attempts to Reuse Old Threat Indicators ...
Introducing IOCRadar: Power Up Your Cyber Stance with IOC Scanning
Introducing IOCRadar: Power Up Your Cyber Stance with IOC Scanning In our increasingly interconnected society, the evolving nature of potential threats presents significant challenges to individuals a...
Real-Life Examples of Successful Threat Intelligence Operations
Real-Life Examples of Successful Threat Intelligence Operations Threat intelligence can improve organizations’ overall security posture and reduce the risk of cyber attacks by developing proactive str...
SOCRadar and VirusTotal Join Forces to Supercharge Cybersecurity Commu...
SOCRadar and VirusTotal Join Forces to Supercharge Cybersecurity Community Today, SOCRadar, inventor of the Extended Threat Intelligence concept, and VirusTotal, a well-renowned malware...
What is New in the MITRE ATT&CK Framework v12 and v13?
What is New in the MITRE ATT&CK Framework v12 and v13? New threat actors are emerging on the dark web daily, and cybercrimes are increasing exponentially. According to some research insights,...
Top 12 Takeaways from Verizon 2023 Data Breach Investigations Report
Top 12 Takeaways from Verizon 2023 Data Breach Investigations Report Verizon’s highly anticipated 16th annual data breach investigation report was released on June 6, 2023. This report, inc...
SOCRadar is Now Officially a dns0.eu Tech Alliance Partner
SOCRadar is Now Officially a dns0.eu Tech Alliance Partner In the ceaseless pursuit of fortifying digital landscapes and strengthening cybersecurity ecosystems, SOCRadar is thrilled to announce its of...
Countering Nation-State Cyber Attacks with Threat Intelligence
Countering Nation-State Cyber Attacks with Threat Intelligence In recent years, attacks targeting critical infrastructures and political figures of states have increased. These attacks are o...