SOCRadar® Cyber Intelligence Inc. | Beyond Phishing: Top 10 Data Breach Sets
Apr 24, 2024
Beyond Phishing: Top 10 Data Breach Sets

Beyond Phishing: Top 10 Data Breach Sets In recent years, there has been a significant increase in the amount of sensitive data available, making cybercrime more of a risk even for people who aren’t v...

Learn More
SOCRadar® Cyber Intelligence Inc. | Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in Open Source Security
Apr 17, 2024
Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in...

Committing a Sin, OpenJS Foundation and XZ Utils Incidents: Lessons in Open Source Security Recent events have brought to light critical issues related to cybersecurity threats and social engineering ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Dark Web Monitoring with Open-Source Tools and Services
Apr 17, 2024
Dark Web Monitoring with Open-Source Tools and Services

Dark Web Monitoring with Open-Source Tools and Services The dark web, intentionally hidden on the internet, is accessible only through specialized browsers or technologies. Defenders monitor it for cl...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Implications of Deepfakes
Apr 12, 2024
Cybersecurity Implications of Deepfakes

Cybersecurity Implications of Deepfakes The year 2024 is an important year in cybersecurity. With fast developments in technology, cyber threats have evolved to use more modern tactics, such as deepfa...

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI
Apr 11, 2024
ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI

ChatGPT Users in Stealer Logs: A 2023 Stealer Analysis of OpenAI Stealer logs serve as the underground repositories of stolen data, filled with sensitive information such as payment card details and c...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Monitor Your Supply Chain’s Dark Web Activities?
Apr 10, 2024
How to Monitor Your Supply Chain’s Dark Web Activities?

How to Monitor Your Supply Chain’s Dark Web Activities? As organizations rely on complex networks of suppliers and vendors to deliver goods and services, ensuring the integrity and resilience of these...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Challenges in 2024 United Kingdom’s Elections
Apr 05, 2024
Cybersecurity Challenges in 2024 United Kingdom’s Elections

Cybersecurity Challenges in 2024 United Kingdom’s Elections Cybersecurity challenges are expected to play a significant role in the upcoming United Kingdom elections in 2024. As the world becomes more...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Detect & Prevent Ransomware Attacks (2024 CISO Edition)
Apr 01, 2024
How to Detect & Prevent Ransomware Attacks (2024 CISO Edition)

How to Detect & Prevent Ransomware Attacks (2024 CISO Edition) ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Importance of Supply Chain Security for Safeguarding Business Ecosystems
Mar 28, 2024
The Importance of Supply Chain Security for Safeguarding Business Ecos...

The Importance of Supply Chain Security for Safeguarding Business Ecosystems In today’s interconnected digital ecosystem, the security of a single organization doesn’t solely depend on its internal de...

Learn More
SOCRadar® Cyber Intelligence Inc. | Analysis of Stealer Logs within the Entertainment Industry
Mar 18, 2024
Analysis of Stealer Logs within the Entertainment Industry

Analysis of Stealer Logs within the Entertainment Industry Stealer logs – databases of stolen information that vividly depict compromised security – are one of the many pieces that hold together the d...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Dangers of Third-Party App Stores: Risks and Precautions
Mar 08, 2024
The Dangers of Third-Party App Stores: Risks and Precautions

The Dangers of Third-Party App Stores: Risks and Precautions When downloading applications, smartphone users typically consider the pre-installed Apple App Store or Google Play. However, there are oth...

Learn More
SOCRadar® Cyber Intelligence Inc. | Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizations
Mar 01, 2024
Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizati...

Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizations The pandemic has brought about radical changes in business models. Alongside digital transformation, the increased efficiency ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Shadow Ops Exposed: Inside the Leak of China's i-Soon Cyber Espionage Empire
Feb 22, 2024
Shadow Ops Exposed: Inside the Leak of China's i-Soon Cyber Espionage ...

Shadow Ops Exposed: Inside the Leak of China’s i-Soon Cyber Espionage Empire Chinese authorities, law enforcement agencies, cybersecurity researchers, and a whole lot of other people are investi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields Strategy
Feb 16, 2024
Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields ...

Fortifying the Digital Frontier: Australia’s Pioneering Cyber Shields Strategy In 2022, Following the Medibank breach in November, Australia’s Cyber Security Minister Clare O’Neil hi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Challenges in Indonesia’s 2024 Elections
Feb 09, 2024
Cybersecurity Challenges in Indonesia’s 2024 Elections

Cybersecurity Challenges in Indonesia’s 2024 Elections ...

Learn More
SOCRadar® Cyber Intelligence Inc. | 2024 Elections: Cybersecurity Challenges in Spain and Beyond
Feb 07, 2024
2024 Elections: Cybersecurity Challenges in Spain and Beyond

2024 Elections: Cybersecurity Challenges in Spain and Beyond As Spain prepares for its crucial 2024 European Parliament and local/municipal elections, the landscape of cybersecurity threats – from sop...

Learn More
SOCRadar® Cyber Intelligence Inc. | Dark Web Monitoring: A Vital Tool for MSSPs
Jan 30, 2024
Dark Web Monitoring: A Vital Tool for MSSPs

Dark Web Monitoring: A Vital Tool for MSSPs In today’s digital age, data breaches, cyber threats, and information security are at the forefront of every organization’s concerns. Managed Security Servi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity
Jan 19, 2024
Okta Customer Support System Breach: Lessons in Supply Chain Risks and...

Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Are MSPs (Managed Service Providers) at Risk of Data Breaches?
Oct 11, 2023
How Are MSPs (Managed Service Providers) at Risk of Data Breaches?

How Are MSPs (Managed Service Providers) at Risk of Data Breaches? Have you ever wondered how your Managed Service Provider (MSP) is protecting both your data and its own? It is prudent to regularly a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA
Oct 06, 2023
Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CI...

Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA Security misconfigurations occur when systems or applications are not correctly set up, leaving them vulnerable to potential se...

Learn More