
Cyber Threats to NGOs Increase: Half of Organizations Targeted
Cyber Threats to NGOs Increase: Half of Organizations Targeted NGOs and humanitarian nonprofits depend on digital communication technologies and software to coordinate their missions worldwide. In par...

5 Tips for Social Media Security
5 Tips for Social Media Security Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and iden...

How to Prevent Steganography Attacks
How to Prevent Steganography Attacks Steganography is an antique soft craft concealing information in paintings or different art products. Most artists use this technique to hide their signatures and ...

The Ultimate Guide to Brand Protection
The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...

What are the Different Types of Attacks in Cybersecurity?
What are the Different Types of Attacks in Cybersecurity? A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devi...

What Do You Need To Know About Cybersecurity in Power Grids
What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...

Danger Lurking in GitHub Repositories
Danger Lurking in GitHub Repositories GitHub is a system that has become the world’s largest source code repository, used by %90 of Fortune 100 companies and 94 million developers for sever...

5 Things You Should Know About the Genesis Marketplace
5 Things You Should Know About the Genesis Marketplace [April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genes...

How to Prevent Credential Stuffing Attacks?
How to Prevent Credential Stuffing Attacks? We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Si...

How Can You Avoid Potential Attacks with SOCRadar Integrations?
How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...

What is a Smishing Attack?
What is a Smishing Attack? Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and...

Vulnerability Round-Up: SOCRadar's Curation of Critical Vulnerabilitie...
Vulnerability Round-Up: SOCRadar’s Curation of Critical Vulnerabilities for 2021 Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vul...

Let's Start From the Beginning: What is Encryption?
Let’s Start From the Beginning: What is Encryption? Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOC...

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 20...
What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022 If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, th...

What are SMB Ports?
What are SMB Ports? The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sh...

What You Need to Know About MSPs
What You Need to Know About MSPs Managed service providers, abbreviated as MSPs, specialize in providing certain services to other companies. These services, called managed services, could be anything...

How Private is Your VPN?
How Private is Your VPN? The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide y...

A Rising Threat in Mobile: What is Banking Malware?
A Rising Threat in Mobile: What is Banking Malware? Mobile Banking malware is a malware family consisting of malicious apps and trojans designed to infect one’s system and collect financial data, pers...

What is Vulnerability Management?
What is Vulnerability Management? The increasing number of vulnerabilities that security teams have to deal with makes it impossible to try to remediate all critical vulnerabilities. In fact, a small ...

Disrupt Attacker Infrastructure to Prevent Future Attacks with Takedow...
Disrupt Attacker Infrastructure to Prevent Future Attacks with Takedown Service Malware and phishing sites harm companies and organizations all over the world. Through removing sites and blocking atta...