![SOCRadar® Cyber Intelligence Inc. | Top 10 Phishing Simulation Tools](https://socradar.io/wp-content/uploads/2024/06/top-10-phishing-simulation-tools.jpg)
Top 10 Phishing Simulation Tools
Top 10 Phishing Simulation Tools Phishing attacks continue to pose a significant threat, affecting both individuals and organizations. To combat these threats, a variety of phishing simulation tools h...
![SOCRadar® Cyber Intelligence Inc. | Global DDoS Attack Landscape: Insights from Q1 2024](https://socradar.io/wp-content/uploads/2024/06/global-ddos-attack-landscape-insights-from-q1-2024.jpg)
Global DDoS Attack Landscape: Insights from Q1 2024
Global DDoS Attack Landscape: Insights from Q1 2024 Distributed Denial of Service (DDoS) attacks continue to escalate in frequency and complexity, posing significant threats across various sectors, pa...
![SOCRadar® Cyber Intelligence Inc. | Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods](https://socradar.io/wp-content/uploads/2024/06/phishing-in-2024-4151-increase-since-launch-of-chatgpt-ai-mitigation-methods.jpg)
Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigati...
Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods Phishing remains a major threat in cybersecurity, with attacks growing more frequent and sophisticated each year. In 20...
![SOCRadar® Cyber Intelligence Inc. | Cyber Threats Targeting the Hajj Season](https://socradar.io/wp-content/uploads/2024/06/cyber-threats-targeting-the-hajj-season.jpg)
Cyber Threats Targeting the Hajj Season
Cyber Threats Targeting the Hajj Season Hajj is a religious obligation for Muslims, which must be completed at least once in their lifetime by all adults who are physically and financially able to mak...
![SOCRadar® Cyber Intelligence Inc. | Exploring the Most Common Passwords in Singapore: Trends, Implications, and Security Tips](https://socradar.io/wp-content/uploads/2024/06/exploring-the-most-common-passwords-in-singapore-trends-implications-and-security-tips.jpg)
Exploring the Most Common Passwords in Singapore: Trends, Implications...
Exploring the Most Common Passwords in Singapore: Trends, Implications, and Security Tips Passwords are essential for protecting your online accounts, yet many people still use weak, easy-to-guess pas...
![SOCRadar® Cyber Intelligence Inc. | Top 5 Phishing Domain Takedown Service](https://socradar.io/wp-content/uploads/2024/05/top-5-phishing-domain-takedown-service.jpg)
Top 5 Phishing Domain Takedown Service
Top 5 Phishing Domain Takedown Service Phishing attacks continue to pose a significant threat to both individuals and organizations. As cyber criminals continue to improve their strategies for exploit...
![SOCRadar® Cyber Intelligence Inc. | Third-Party Vendor Breaches: Causes, Key Statistics, Recent Incidents, and Effective Mitigation Strategies](https://socradar.io/wp-content/uploads/2024/05/third-party-vendor-breaches-causes-key-statistics-recent-incidents-and-effective-mitigation-strategies.jpg)
Third-Party Vendor Breaches: Causes, Key Statistics, Recent Incidents,...
Third-Party Vendor Breaches: Causes, Key Statistics, Recent Incidents, and Effective Mitigation Strategies In modern business operations, most organizations extend their activities beyond their immedi...
![SOCRadar® Cyber Intelligence Inc. | Analysis of UK Password Dictionary: The Ultimate Wordlist](https://socradar.io/wp-content/uploads/2024/05/analysis-of-uk-password-dictionary-the-ultimate-wordlist.jpg)
Analysis of UK Password Dictionary: The Ultimate Wordlist
Analysis of UK Password Dictionary: The Ultimate Wordlist Passwords should be strong and unique. They act as the first line of defense in safeguarding our personal and business digital assets. As we e...
![SOCRadar® Cyber Intelligence Inc. | Password Dictionary Analysis: Ultimate Wordlist of USA Passwords](https://socradar.io/wp-content/uploads/2024/04/password-dictionary-analysis-most-used-passwords-in-the-usa.jpg)
Password Dictionary Analysis: Ultimate Wordlist of USA Passwords
Password Dictionary Analysis: Ultimate Wordlist of USA Passwords In the digital age, where our lives are increasingly connected with technology, the importance of securing our online accounts cannot b...
![SOCRadar® Cyber Intelligence Inc. | Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists](https://socradar.io/wp-content/uploads/2024/04/tool-in-pentesters-arsenal-password-dictionary-lists.png)
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists Newbie penetration testers often struggle to grasp the significance of the initial findings reported by most Dynamic Application Scann...
![SOCRadar® Cyber Intelligence Inc. | DarkGate Malware: Exploring Threats and Countermeasures](https://socradar.io/wp-content/uploads/2024/02/darkgate-malware-exploring-threats-and-countermeasures.png)
DarkGate Malware: Exploring Threats and Countermeasures
DarkGate Malware: Exploring Threats and Countermeasures As we get increasingly digitized, the threat posed by malware has reached unprecedented levels in parallel. From individual users to large corpo...
![SOCRadar® Cyber Intelligence Inc. | Using Jupyter Notebook for CTI using PyMISP](https://socradar.io/wp-content/uploads/2024/02/using-jupyter-notebook-for-cti-using-pymisp.png)
Using Jupyter Notebook for CTI using PyMISP
Using Jupyter Notebook for CTI using PyMISP In Cyber Threat Intelligence (CTI), Jupyter Notebook and PyMISP are transformative tools. Just as Bash commands empower defenders, these platforms offer dyn...
![SOCRadar® Cyber Intelligence Inc. | ‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak](https://socradar.io/wp-content/uploads/2023/09/classified-intel-on-the-public-telegram-channel-pentagon-us-leak.png)
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...
![SOCRadar® Cyber Intelligence Inc. | QakBot, One of The Most Observed Malware](https://socradar.io/wp-content/uploads/2023/08/qakbot-one-of-the-most-observed-malware.png)
QakBot, One of The Most Observed Malware
QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...
![SOCRadar® Cyber Intelligence Inc. | Raccoon Stealer Resurfaces with New Enhancements](https://socradar.io/wp-content/uploads/2023/08/raccoon-stealer-resurfaces-with-new-enhancements.png)
Raccoon Stealer Resurfaces with New Enhancements
Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...
![SOCRadar® Cyber Intelligence Inc. | Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files](https://socradar.io/wp-content/uploads/2023/08/telegram-channels-unveiled-the-hidden-dangers-lurking-in-shared-files.png)
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a pop...
![SOCRadar® Cyber Intelligence Inc. | Possible Cyber Threats in the 2024 Olympics](https://socradar.io/wp-content/uploads/2023/08/possible-cyber-threats-in-the-2024-olympics-1.png)
Possible Cyber Threats in the 2024 Olympics
Possible Cyber Threats in the 2024 Olympics The design of the Paris 2024 Olympic and Paralympic torch, introduced on July 25, 2023, struck the first gong for The Paris 2024 Summer Olympic and Paralymp...
![SOCRadar® Cyber Intelligence Inc. | What is EMOTET Malware and How to Protect Yourself](https://socradar.io/wp-content/uploads/2022/03/what-is-emotet-malware-and-how-to-protect.png)
What is EMOTET Malware and How to Protect Yourself
What is EMOTET Malware and How to Protect Yourself According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attac...
![SOCRadar® Cyber Intelligence Inc. | The Mindset Behind Phishing Campaigns](https://socradar.io/wp-content/uploads/2023/06/the-mindset-behind-a-phishing-campaign.png)
The Mindset Behind Phishing Campaigns
The Mindset Behind Phishing Campaigns Phishing attacks are cybercrimes that target individuals, businesses, and organizations. These attacks use deception and manipulation techniques to trick victims ...
![SOCRadar® Cyber Intelligence Inc. | RDP Access Sales on Dark Web Forums Detected by SOCRadar](https://socradar.io/wp-content/uploads/2023/06/rdp-access-sales-on-dark-web-forums-detected-by-socradar.png)
RDP Access Sales on Dark Web Forums Detected by SOCRadar
RDP Access Sales on Dark Web Forums Detected by SOCRadar Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection...