Blog

Latest articles from SOCRadar

What is a Phishing Kit?
April 6, 2023

What is a Phishing Kit?

A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with little or no phishing experience to… Continue Reading

How Can SOCRadar Help Fraud Teams
April 4, 2023

How SOCRadar Can Help Fraud Teams?

Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made by using fake or stolen credit cards. Today, with the advantages of the rapid digitalization… Continue Reading

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
October 6, 2022

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries

People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and finance. Most financial services have been replaced by digital banking solutions known as fintech (financial technology), which… Continue Reading

What Do You Need to Know About New SAMA Principles?
June 8, 2022

What Do You Need to Know About New SAMA Principles?

The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of financial services, securing the availability of sensitive data, transactions, and services has become… Continue Reading

What are Threat Hunting Tools?
June 2, 2022

What are Threat Hunting Tools?

Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunting is searching for new possible risks and vulnerabilities beyond recognized alerts or malicious… Continue Reading

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
June 1, 2022

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breaches for cybersecurity experts and leaders worldwide. The report includes reviews of around 24,000 cybersecurity incidents that… Continue Reading

8 Ways to Prevent Supply Chain Attacks
May 3, 2022

8 Ways to Prevent Supply Chain Attacks

Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others. Attackers including APT actors have been observed to be attacking… Continue Reading

How to Identify Spear Phishing?
March 25, 2022

How to Identify Spear Phishing?

Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading

Telegram: A New Place for Hackers
March 24, 2022

Telegram: A New Place for Hackers

One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading

What is EMOTET Malware and How to Protect Yourself
March 22, 2022

What is EMOTET Malware and How to Protect Yourself

According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading

March 8, 2022

How to Prevent Credential Stuffing Attacks?

We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Since it can take a long time before the data get purchased… Continue Reading

How to Stop a DDoS Attack
March 4, 2022

How to Stop a DDoS Attack?

What is a DDoS Attack? A DDoS attack, also known as distributed denial of service attack, is a type of web attack aiming to cripple a web system's servers and make the servers unreachable to… Continue Reading

What is an Accellion Cyber Attack?
February 5, 2022

What is an Accellion Cyber Attack?

Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospitals, and colleges use the company’s enterprise content firewall. Baring Private Equity Asia and Bregal… Continue Reading

what-is-a-smishing-attack
February 2, 2022

What is a Smishing Attack?

Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and “phishing” are combined in the… Continue Reading

January 13, 2022

What is Cryptocurrency Mining Malware?

A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems called nodes. Blockchains are decentralized networks in which no single authority controls the… Continue Reading

how-to-protect-employees-against-phishing-attacks
January 7, 2022

How to Protect Employees Against Phishing Attacks?

The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an attacker utilizes human contact (social skills) to gather or compromise information about an organization… Continue Reading

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
December 21, 2021

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022

If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, then it needs a BYOD security policy.  What is BYOD? Initially, employees used only company-issued devices… Continue Reading

November 30, 2021

What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability

One of the world’s most significant open-source projects, Apache is a free and open-source cross-platform HTTP web server. Apache is responsible for handling back-and-forth communication between the server and the browser. Apache has been developed… Continue Reading

November 22, 2021

How to Protect Against Digital Risks in Three Steps

For many organizations, digital initiatives are a lifeline. IoT, social, machine learning, big data analytics, artificial intelligence, and augmented reality enable digital startups to streamline operations, adopt new business models, and improve customer experience, maximizing… Continue Reading

November 18, 2021

How Private is Your VPN?

The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide your true identity on the internet. Third parties… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo