Blog

Latest articles from SOCRadar

Insider Threats Rising: Average Cost of an Incident is $6.6M
August 1, 2022

Insider Threats Rising: Average Cost of an Incident is $6.6M

The annual Cost of a Data Breach Report, featuring research by Ponemon Institute, offers insights from 550 actual breaches to help you understand cyber risk in a changing world. Research shows that insider threats cause… Continue Reading

What is Domain Hijacking and How to Prevent
July 26, 2022

What is Domain Hijacking and How to Prevent

Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading

Top 5 Tools for Phishing Domain Detection
July 25, 2022

Top 5 Tools for Phishing Domain Detection

Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against such attacks. However, the attackers develop new TTPs with the… Continue Reading

What is BEC Attack and How to Prevent it?
July 21, 2022

What is BEC Attack and How to Prevent it?

BEC attack is a type of social engineering attack that takes place over email and the attacker aims for financial gain. Often, attackers aim to trick employees into sending money or valuable personal data (PII)… Continue Reading

What is Spoofing Attack and How to Prevent It?
July 20, 2022

What is Spoofing Attack and How to Prevent It?

In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal money, or transmit malware. How Does Spoofing Work? Spoofing often consists of… Continue Reading

How to Build a Proactive Incident Response Plan?
July 19, 2022

How to Build a Proactive Incident Response Plan?

Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. Despite all these precautions, sometimes employees can fall victim to social engineering attacks due to unawareness and ignorance.… Continue Reading

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
May 16, 2022

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same type of content. One of the most notable features of the attack was that it quickly… Continue Reading

Cyber Threats to NGOs Increase: Half of Organizations Targeted
May 4, 2022

Cyber Threats to NGOs Increase: Half of Organizations Targeted

NGOs and humanitarian nonprofits depend on digital communication technologies and software to coordinate their missions worldwide. In particular, organizations working in humanitarian aid need these technologies to perform operations such as data collection, classification, and… Continue Reading

5 Tips for Social Media Security
May 2, 2022

5 Tips for Social Media Security

Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and identity theft have become commonplace attacks targeted at individuals.… Continue Reading

How to Prevent Steganography Attacks
April 26, 2022

How to Prevent Steganography Attacks

Steganography is an antique soft craft concealing information in paintings or different art products. Most artists use this technique to hide their signatures and additional concealed messages within their artworks. Origin of the Word "Steganography"… Continue Reading

The Ultimate Guide to Brand Protection
April 20, 2022

The Ultimate Guide to Brand Protection

As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter the domain to use legitimate advances produced by corporations to bolster their… Continue Reading

What are the Different Types of Attacks in Cybersecurity?
April 18, 2022

What are the Different Types of Attacks in Cybersecurity?

A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devices. Cyber attacks come in many flavors, each capable of attacking a specific computer… Continue Reading

What Do You Need To Know About Cybersecurity in Power Grids
April 15, 2022

What Do You Need To Know About Cybersecurity in Power Grids

Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading

What is Malware as a Service?
April 12, 2022

What is Malware as a service (MaaS)?

In time, the hacker underworld creates a similar model of Software-as-a-Service (SaaS). Malware as a service and SaaS have a similar duty with one main difference; MaaS is an unlawful version of SaaS. MaaS gives… Continue Reading

5 Things You Should Know About the Genesis Marketplace
April 1, 2022

5 Things You Should Know About the Genesis Marketplace

The Genesis Market is an automated online store that sells credentials, fingerprints, web platform vulnerabilities, cookies, and various sensitive data that assist cybercriminal hackers in gaining initial access into the targeted victim network. Security researchers… Continue Reading

March 8, 2022

How to Prevent Credential Stuffing Attacks?

We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Since it can take a long time before the data get purchased… Continue Reading

How to Stop a DDoS Attack
March 4, 2022

How to Stop a DDoS Attack?

What is a DDoS Attack? A DDoS attack, also known as distributed denial of service attack, is a type of web attack aiming to cripple a web system's servers and make the servers unreachable to… Continue Reading

February 24, 2022

How Can You Avoid Potential Attacks with SOCRadar Integrations?

Today's blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API documents regarding the APIs provided by SOCRadar (used depending on licenses/packages) from this link.  SOCRadar,… Continue Reading

How to Maintain Online Security
February 15, 2022

How to Maintain Your Online Security?

If you're concerned about your online security and getting more nervous about that, that's entirely normal. Every day we hear the news about data breaches and cyber-attacks happening. Some people think that's only companies' or… Continue Reading

what-is-a-smishing-attack
February 2, 2022

What is a Smishing Attack?

Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and “phishing” are combined in the… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo