Major Cyberattacks in Review: May 2023
Major Cyberattacks in Review: May 2023 Throughout May 2023, the cybersecurity landscape witnessed a surge in notable cyberattacks. These incidents encompassed supply chain attacks, data breaches,...
How Can Strategic CTI Help CISOs Fulfil Their Task?
How Can Strategic CTI Help CISOs Fulfil Their Task? Cyber threats have an emerging adversarial impact on organizations such as enterprises and governments. In parallel with increasing cyberattacks and...
Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOA...
Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs) Privacy and surveillance are two sides of a coin, and the conditions that have blurred the boundaries between them have also pa...
Hacked Healthcare: Rising Security Breaches in the US
Hacked Healthcare: Rising Security Breaches in the US The healthcare industry is an attractive, prime target for ransomware groups; the AIDS Trojan, also known as the PC Cyborg virus, was the fir...
How is Threat Intelligence Used to Monitor Criminal Activity on the Da...
How is Threat Intelligence Used to Monitor Criminal Activity on the Dark Web? The dark web is a part of the Internet that differs from the regular Internet as it is a network that offers anonymity and...
Discord: The New Playground for Cybercriminals
Discord: The New Playground for Cybercriminals Discord has rapidly grown in popularity as a communication platform in recent years, serving as a virtual gathering place for online communities, gamers,...
Guarding the Gates: An Exploration of the Top 10 Supply Chain Attacks
Guarding the Gates: An Exploration of the Top 10 Supply Chain Attacks Once upon a time, an anxious emperor, having heard a prophecy of his daughter’s demise by a snakebite, ordered the construct...
G7: Cybersecurity Reflections
G7: Cybersecurity Reflections The G7 Cybersecurity Summit 2023 is just around the corner and is being held in Hiroshima, Japan, which is a city that was devastated by an atomic bomb attack in 1945, no...
Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Rep...
Unlock Industry-Specific Cyber Insights: Industry Threat Landscape Report Industry cyber threat landscape means the perspective of distinct cybersecurity threats targeting the related industry. The th...
Major Cyberattacks in Review: April 2023
Major Cyberattacks in Review: April 2023 In April 2023, several cybersecurity incidents were reported across various industries. These included supply chain attacks, data breaches, and cryptocurrency ...
5 Lessons Learned from Healthcare Industry Cyberattacks in 2022
5 Lessons Learned from Healthcare Industry Cyberattacks in 2022 Like other critical infrastructures, the healthcare industry is frequently targeted by cyberattacks. The attacks in the healthcare verti...
Gulf Countries Threat Landscape Report: Cyber Security Posture of the ...
Gulf Countries Threat Landscape Report: Cyber Security Posture of the GCC Countries “Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates constitute the Cooperation Council for the...
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in ...
Cyber Deception at the Ballot Box: Unmasking the Phishing Epidemic in Election Campaigns During periods of elections, people’s desire to obtain knowledge is outstanding, and they are overloaded ...
SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer...
SOCRadar Technical Whitepaper: ‘Snapshot of 70 Million Stealer Logs’ SOCRadar’s first technical white paper is out! Here are some highlights: Threat actors created fake data to increase the num...
An Inherent Weakness: Critical Infrastructures in Gulf Countries
An Inherent Weakness: Critical Infrastructures in Gulf Countries One of the most devastating cyberattacks on critical infrastructure was the Colonial Pipeline attack in the United States in May 2021. ...
AI vs. AI: Future of the Cybersecurity Battles
AI vs. AI: Future of the Cybersecurity Battles Attacks and security solutions tailored with the help of artificial intelligence (AI) have become a trending subject in the security industry as AI bots ...
Major Cyberattacks in Review: March 2023
Major Cyberattacks in Review: March 2023 Cybersecurity remains a major concern for organizations of all sizes as cyberattacks become more sophisticated and frequent. Despite efforts to enhan...
How SOCRadar Can Help You with Threat Hunting?
How SOCRadar Can Help You with Threat Hunting? This article briefly explains threat hunting and SOCRadar’s ability to use the feature. If you are still reading this, we invite you to try SOCRadar XTI ...
Analysis of the Critical Infrastructure Industries From a Cybersecurit...
Analysis of the Critical Infrastructure Industries From a Cybersecurity Perspective ‘By 2024, a cyberattack will so damage critical infrastructure that a member of the G20 will reciprocate with ...
Telegram 2.0: A New Era of Privacy
Telegram 2.0: A New Era of Privacy On December 6, 2022, Telegram shared a new update blog on its blog page. In this blog post, specific topics attract attention, primarily based on privacy, and will a...