SOCRadar® Cyber Intelligence Inc. | Shadow Ops Exposed: Inside the Leak of China's i-Soon Cyber Espionage Empire
Feb 22, 2024
Shadow Ops Exposed: Inside the Leak of China's i-Soon Cyber Espionage ...

Shadow Ops Exposed: Inside the Leak of China’s i-Soon Cyber Espionage Empire Chinese authorities, law enforcement agencies, cybersecurity researchers, and a whole lot of other people are investi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields Strategy
Feb 16, 2024
Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields ...

Fortifying the Digital Frontier: Australia’s Pioneering Cyber Shields Strategy In 2022, Following the Medibank breach in November, Australia’s Cyber Security Minister Clare O’Neil hi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Challenges in Indonesia’s 2024 Elections
Feb 09, 2024
Cybersecurity Challenges in Indonesia’s 2024 Elections

Cybersecurity Challenges in Indonesia’s 2024 Elections ...

Learn More
SOCRadar® Cyber Intelligence Inc. | 2024 Elections: Cybersecurity Challenges in Spain and Beyond
Feb 07, 2024
2024 Elections: Cybersecurity Challenges in Spain and Beyond

2024 Elections: Cybersecurity Challenges in Spain and Beyond As Spain prepares for its crucial 2024 European Parliament and local/municipal elections, the landscape of cybersecurity threats – from sop...

Learn More
SOCRadar® Cyber Intelligence Inc. | Dark Web Monitoring: A Vital Tool for MSSPs
Jan 30, 2024
Dark Web Monitoring: A Vital Tool for MSSPs

Dark Web Monitoring: A Vital Tool for MSSPs In today’s digital age, data breaches, cyber threats, and information security are at the forefront of every organization’s concerns. Managed Security Servi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity
Jan 19, 2024
Okta Customer Support System Breach: Lessons in Supply Chain Risks and...

Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Are MSPs (Managed Service Providers) at Risk of Data Breaches?
Oct 11, 2023
How Are MSPs (Managed Service Providers) at Risk of Data Breaches?

How Are MSPs (Managed Service Providers) at Risk of Data Breaches? Have you ever wondered how your Managed Service Provider (MSP) is protecting both your data and its own? It is prudent to regularly a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA
Oct 06, 2023
Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CI...

Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA Security misconfigurations occur when systems or applications are not correctly set up, leaving them vulnerable to potential se...

Learn More
SOCRadar® Cyber Intelligence Inc. | The
Oct 02, 2023
The "Evil" of Everything - Part II: Evilginx and EvilQR Rises AitM

The “Evil” of Everything – Part II: Evilginx and EvilQR Rises AitMIn the ever-evolving landscape of cybersecurity threats, it is imperative to maintain vigilance and adaptability. ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The
Oct 02, 2023
The "Evil" of Everything - Part I: EvilProxy Rises AitM

The “Evil” of Everything – Part I: EvilProxy Rises AitMIn today’s digital era, detecting a burgeoning type of cyberattack, known as Adversary-in-the-Middle (AiTM) attacks, is...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Torrent Landscape: Understanding Security, Risks, and the Future
Sep 29, 2023
The Torrent Landscape: Understanding Security, Risks, and the Future

The Torrent Landscape: Understanding Security, Risks, and the Future In today’s digital age, the term “torrenting” often evokes images of pirated movies, music, or TV shows. However,...

Learn More
SOCRadar® Cyber Intelligence Inc. | NIST Cybersecurity Framework 2.0: What You Need to Know
Sep 26, 2023
NIST Cybersecurity Framework 2.0: What You Need to Know

NIST Cybersecurity Framework 2.0: What You Need to Know In a previous SOCRadar blog post, we delved into the importance of cybersecurity frameworks for today’s organizations. In this installment, we p...

Learn More
SOCRadar® Cyber Intelligence Inc. | Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records
Sep 22, 2023
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medic...

Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records In a regular threat and vulnerability hunting activity, SOCRadar has discovered during their research that thousands of...

Learn More
SOCRadar® Cyber Intelligence Inc. | Don't be Blinded by What You See: Demystifying Homograph Attacks
Sep 01, 2023
Don't be Blinded by What You See: Demystifying Homograph Attacks

Don’t be Blinded by What You See: Demystifying Homograph Attacks ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Chain Reactions: Footprints of Major Supply Chain Attacks
Aug 28, 2023
Chain Reactions: Footprints of Major Supply Chain Attacks

Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability Intelligence and CVERadar
Aug 25, 2023
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...

Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealin...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating Cloud Vulnerabilities: Challenges and Solutions
Aug 24, 2023
Navigating Cloud Vulnerabilities: Challenges and Solutions

Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Raccoon Stealer Resurfaces with New Enhancements
Aug 24, 2023
Raccoon Stealer Resurfaces with New Enhancements

Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience
Aug 23, 2023
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resi...

Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience In today’s rapidly evolving digital landscape, the term “cybersecurity” has become synonymous with safegu...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Software
Aug 17, 2023
The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Soft...

The Wolf in Sheep’s Clothing: How Cybercriminals Abuse Legitimate Software [Update] November 9, 2023: Added FBI’s notice, see under the title: “FBI Warns of Ransomware Threats via Th...

Learn More