The Importance of Supply Chain Security for Safeguarding Business Ecos...
The Importance of Supply Chain Security for Safeguarding Business Ecosystems In today’s interconnected digital ecosystem, the security of a single organization doesn’t solely depend on its internal de...
Analysis of Stealer Logs within the Entertainment Industry
Analysis of Stealer Logs within the Entertainment Industry Stealer logs – databases of stolen information that vividly depict compromised security – are one of the many pieces that hold together the d...
The Dangers of Third-Party App Stores: Risks and Precautions
The Dangers of Third-Party App Stores: Risks and Precautions When downloading applications, smartphone users typically consider the pre-installed Apple App Store or Google Play. However, there are oth...
Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizati...
Business Email Compromise (BEC) Attacks: A Sneaky Threat to Organizations The pandemic has brought about radical changes in business models. Alongside digital transformation, the increased efficiency ...
Shadow Ops Exposed: Inside the Leak of China's i-Soon Cyber Espionage ...
Shadow Ops Exposed: Inside the Leak of China’s i-Soon Cyber Espionage Empire Chinese authorities, law enforcement agencies, cybersecurity researchers, and a whole lot of other people are investi...
Fortifying the Digital Frontier: Australia's Pioneering Cyber Shields ...
Fortifying the Digital Frontier: Australia’s Pioneering Cyber Shields Strategy In 2022, Following the Medibank breach in November, Australia’s Cyber Security Minister Clare O’Neil hi...
Cybersecurity Challenges in Indonesia’s 2024 Elections
Cybersecurity Challenges in Indonesia’s 2024 Elections ...
2024 Elections: Cybersecurity Challenges in Spain and Beyond
2024 Elections: Cybersecurity Challenges in Spain and Beyond As Spain prepares for its crucial 2024 European Parliament and local/municipal elections, the landscape of cybersecurity threats – from sop...
Dark Web Monitoring: A Vital Tool for MSSPs
Dark Web Monitoring: A Vital Tool for MSSPs In today’s digital age, data breaches, cyber threats, and information security are at the forefront of every organization’s concerns. Managed Security Servi...
Okta Customer Support System Breach: Lessons in Supply Chain Risks and...
Okta Customer Support System Breach: Lessons in Supply Chain Risks and Cybersecurity How successful are you in ensuring your cybersecurity in the digital environment? Personal and corporate data secur...
How Are MSPs (Managed Service Providers) at Risk of Data Breaches?
How Are MSPs (Managed Service Providers) at Risk of Data Breaches? Have you ever wondered how your Managed Service Provider (MSP) is protecting both your data and its own? It is prudent to regularly a...
Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CI...
Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA Security misconfigurations occur when systems or applications are not correctly set up, leaving them vulnerable to potential se...
The "Evil" of Everything - Part II: Evilginx and EvilQR Rises AitM
The “Evil” of Everything – Part II: Evilginx and EvilQR Rises AitM In the ever-evolving landscape of cybersecurity threats, it is imperative to maintain vigilance and adaptability. ...
The "Evil" of Everything - Part I: EvilProxy Rises AitM
The “Evil” of Everything – Part I: EvilProxy Rises AitM In today’s digital era, detecting a burgeoning type of cyberattack, known as Adversary-in-the-Middle (AiTM) attacks, is...
The Torrent Landscape: Understanding Security, Risks, and the Future
The Torrent Landscape: Understanding Security, Risks, and the Future In today’s digital age, the term “torrenting” often evokes images of pirated movies, music, or TV shows. However,...
NIST Cybersecurity Framework 2.0: What You Need to Know
NIST Cybersecurity Framework 2.0: What You Need to Know In a previous SOCRadar blog post, we delved into the importance of cybersecurity frameworks for today’s organizations. In this installment, we p...
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medic...
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records In a regular threat and vulnerability hunting activity, SOCRadar has discovered during their research that thousands of...
Don't be Blinded by What You See: Demystifying Homograph Attacks
Don’t be Blinded by What You See: Demystifying Homograph Attacks ...
Chain Reactions: Footprints of Major Supply Chain Attacks
Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs...
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...
Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with...