Blog

Latest articles from SOCRadar

8 Ways to Prevent Supply Chain Attacks
May 3, 2022

8 Ways to Prevent Supply Chain Attacks

Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others. Attackers including APT actors have been observed to be attacking… Continue Reading

How to Identify Spear Phishing?
March 25, 2022

How to Identify Spear Phishing?

Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading

Telegram: A New Place for Hackers
March 24, 2022

Telegram: A New Place for Hackers

One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading

What is a Phishing Kit?
March 24, 2022

What is a Phishing Kit?

A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with little or no phishing experience to… Continue Reading

What is EMOTET Malware and How to Protect Yourself
March 22, 2022

What is EMOTET Malware and How to Protect Yourself

According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading

March 8, 2022

How to Prevent Credential Stuffing Attacks?

We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Since it can take a long time before the data get purchased… Continue Reading

How to Stop a DDoS Attack
March 4, 2022

How to Stop a DDoS Attack?

What is a DDoS Attack? A DDoS attack, also known as distributed denial of service attack, is a type of web attack aiming to cripple a web system's servers and make the servers unreachable to… Continue Reading

What is an Accellion Cyber Attack?
February 5, 2022

What is an Accellion Cyber Attack?

Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospitals, and colleges use the company’s enterprise content firewall. Baring Private Equity Asia and Bregal… Continue Reading

what-is-a-smishing-attack
February 2, 2022

What is a Smishing Attack?

Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and “phishing” are combined in the… Continue Reading

What-is-Third-Party-Risk-Management
January 25, 2022

What is Third-Party Risk Management?

Third-party risk management (TPRM) is a type of risk management that focuses on identifying and mitigating risks associated with the usage of third-party vendors (sometimes referred to as vendors, suppliers, partners, contractors, or service providers).… Continue Reading

January 13, 2022

What is Cryptocurrency Mining Malware?

A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems called nodes. Blockchains are decentralized networks in which no single authority controls the… Continue Reading

how-to-protect-employees-against-phishing-attacks
January 7, 2022

How to Protect Employees Against Phishing Attacks?

The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an attacker utilizes human contact (social skills) to gather or compromise information about an organization… Continue Reading

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
December 21, 2021

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022

If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, then it needs a BYOD security policy.  What is BYOD? Initially, employees used only company-issued devices… Continue Reading

November 30, 2021

What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability

One of the world’s most significant open-source projects, Apache is a free and open-source cross-platform HTTP web server. Apache is responsible for handling back-and-forth communication between the server and the browser. Apache has been developed… Continue Reading

November 22, 2021

How to Protect Against Digital Risks in Three Steps

For many organizations, digital initiatives are a lifeline. IoT, social, machine learning, big data analytics, artificial intelligence, and augmented reality enable digital startups to streamline operations, adopt new business models, and improve customer experience, maximizing… Continue Reading

November 18, 2021

How Private is Your VPN?

The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide your true identity on the internet. Third parties… Continue Reading

November 17, 2021

Why Do Organizations Need IAM?

Identity and access management (IAM) is a discipline to ensure that the right people and job roles (identities) can access the tools they need in the organization. The enterprises can control employee apps without logging… Continue Reading

November 15, 2021

What is External Attack Surface?

The attack surface is all hardware, software and cloud assets accessible from the internet that processes or stores data. All exposed IT assets, from servers to APIs, are part of the attack surface, whether or… Continue Reading

November 12, 2021

How SOCRadar Can Help Fraud Teams?

Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made by using fake or stolen credit cards. Today, with the advantages of… Continue Reading

November 11, 2021

A Rising Threat in Mobile: What is Banking Malware?

Mobile Banking malware is a malware family consisting of malicious apps and trojans designed to infect one’s system and collect financial data, personal information and potentially steal login credentials. Over %95 of mobile malware are… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo