Latest articles from SOCRadar
Email accounts are the primary key to accessing various online services in today's digital age. They are used to create accounts and serve as login credentials for platforms such as Facebook, Twitter, and Instagram. However, some… Continue Reading
The world has changed rapidly since the invention of the Internet. One of the most important aspects it affected is using the Internet for banking. According to Forbes, as of 2022, 78% of adults in the U.S. prefer… Continue Reading
Attacks and security solutions tailored with the help of artificial intelligence (AI) have become a trending subject in the security industry as AI bots continue to improve. The power of AI has initiated an arms… Continue Reading
"Hello Alice, ABC company is one of our new business partners. The invoice attached needs to be taken care of today. This is high priority. Regards, Bob, CFO, XYZ" This email could be perfectly normal… Continue Reading
As technology evolves, software development has become increasingly intricate and interconnected. Third-party dependencies and open-source libraries have made it easier for developers to build complex applications in today's world. However, this convenience has risks, with the possibility… Continue Reading
In the ever-growing world ofcybersecurity, vulnerability brokers have gained enough voice to be recognized as essential actors in the space. These actors can be anonymous individuals or well-known organizations specializing in identifying and purchasing vulnerabilities… Continue Reading
Microsoft is one of the big five American information technology companies and one of the leading companies in the information technology sector. With a wide range of products, Microsoft holds an 85% Market Share in… Continue Reading
The human factor is one of the most challenging components of cybersecurity, and the topic where the human factor is most evident is insider threats. Insider attacks negatively impact an organization's reputation, customer trust, and… Continue Reading
Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made by using fake or stolen credit cards. Today, with the advantages of the rapid digitalization… Continue Reading
The birth and growth of social media were one of the events shaping the last decades. It started with a straightforward idea (connecting with your school buddies), but social media affected people's lives and nations`… Continue Reading
If you're concerned about your online security and getting more nervous about that, that's entirely normal. Every day we hear the news about data breaches and cyber-attacks happening. Some people think that's only companies' or… Continue Reading
On March 8, 2023, SOCRadar announced that it received a $5 million Series A investment from 212, a leading equity fund investing in B2B technology start-ups. Then it has become the target of cyber fraudsters. As… Continue Reading
In time, the hacker underworld creates a similar model of Software-as-a-Service (SaaS). Malware as a service and SaaS have a similar duty with one main difference; MaaS is an unlawful version of SaaS. MaaS gives… Continue Reading
Recently, many cyberattacks on large corporations have begun with acquiring credentials via multiple methods, particularly social engineering and stealer malware. Obtaining the passwords of a senior executive rather than an ordinary employee is the cherry on… Continue Reading
With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to store, process, and manage their data. Cloud computing is a model for delivering computing services… Continue Reading
By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching for a way to breach defenses and expose what is underneath. During the Covid-19… Continue Reading
The digitalization process has become a norm in any business. Now, organizations' assets are highly increased, and there are many things to consider or manage. That's why companies from all industries started to invest in… Continue Reading
Microsoft Windows directory service Active Directory (AD) enables IT administrators to manage permissions and restrict access to network resources. With this identity and access management solution, you can specify who has access to what parts… Continue Reading
By SOCRadar Research GitHub is a system that has become the world's largest source code repository, used by %90 of Fortune 100 companies and 94 million developers for several purposes such as version control, source code… Continue Reading
A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerabilities. The program verifies the usage of certain sequences of… Continue Reading