Latest articles from SOCRadar
On March 8, 2023, SOCRadar announced that it received a $5 million Series A investment from 212, a leading equity fund investing in B2B technology start-ups. Then it has become the target of cyber fraudsters. As… Continue Reading
Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity specialists. It takes less time for security experts to research a website or online service,… Continue Reading
Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious threat to organizations. The numbers in the "Phishing Activity Trends Reports" of the last quarter… Continue Reading
Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out more and more sophisticated attacks every day, the importance… Continue Reading
1-What is a Phishing Attack? Phishing is a cyberattack that collects sensitive information such as login credentials, credit card numbers, bank account numbers, or other financial information by pretending to be a real website or… Continue Reading
We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?… Continue Reading
1- What is a BEC attack? A Business Email Compromise (BEC) attack is a cyberattack involving the hijacking, spoofing, or impersonation of a business email address. The victim of a BEC attack receives an email… Continue Reading
What is a Domain Hijacking Attack? Domain Hijacking (Domain Name Theft), the control of a domain name, a domain name to be changed without the permission of the original owner of the registration or domain name… Continue Reading
Cybersecurity threats are evolving quickly, and there's no time to keep up to date on the new details for most security researchers. This is why threat intelligence is an important part of the security activities… Continue Reading
Threat Intelligence plays a key role in providing the relevant intelligence for companies to help them carry out protective measures and keep their confidentiality. This makes it a promising career path for cyber security enthusiasts.… Continue Reading
GitHub is a standard when it comes to sharing code among developers. It is the most essential platform used by developers in every company, and despite the broad usage, there are still bad practices made… Continue Reading
The deep web is the underground of the whole web. Accessing it is not quite difficult, but you need to follow some basic steps in order to retain your privacy. We previously wrote a blog… Continue Reading
With the current COVID-19 pandemic, remote working has become an inevitable option for many organizations. While enterprises have their own well-prepared IT teams, the pandemic has caught small organizations off guard in the security aspect.… Continue Reading