Latest articles from SOCRadar

October 22, 2021

What Is Ransomware-as-a-Service (RaaS)?

While informing you about ransomware since the beginning of October, we talked about how lucrative "E-crime" has become. With this information in mind, it's crucial to understand how malware progresses in "business" logic. This blog… Continue Reading

October 20, 2021

Who Is the BlackByte Ransomware Group and How Does the Decryptor Works?

Ransomware attacks impact organizations every single day. But it doesn't always have to be bad news. Victims of BlackByte ransomware can now decrypt and get back their files as a free decryption tool has just… Continue Reading

October 15, 2021

Why Do States Take Various Steps to Stop Ransomware Attacks?

Thirty-one countries and European Union's representatives involved in a two-day "ransomware summit" led by the US have released a joint statement pledging to make systems more resilient against the attack and outline measures taken to… Continue Reading

October 14, 2021

​​What Is Babuk? The Ransomware Gang You Should Know About

Babuk, also known internally as Babyk, initially "Vasa Locker," is a pretty new ransomware threat discovered at the beginning of 2021. The gang, defining itself as a non-malicious group created to reveal the security issues… Continue Reading

October 13, 2021

​​Why Ransomware Is a Major Threat to Certain Industries

Ransomware attacks are on the rise and continue to be disruptive in the cybersecurity industry, affecting everything from financial institutions to higher education. Ransomware attacks affect every industry and almost every business of any size.… Continue Reading

October 7, 2021

Top Five Causes of Ransomware Attacks

Ransomware attacks deeply affect our lives nowadays. Every day we wake up to the news of another attack. To better prevent these attacks, it is critical to understand the tactics attackers use to deliver. There… Continue Reading

October 6, 2021

The Lifecycle of a Ransomware Attack

There are many different types of ransomware and multiple criminal gangs operating in this underworld. Once ransomware gangs assume control, they usually demand a ransom to restore the victim's encrypted data access. The frequency of… Continue Reading

October 5, 2021

How Can You Detect Ransomware Attacks Using SOCRadar?

We continue to inform you about ransomware within the scope of Cyber Security Awareness Month. Today's topic is "how SOCRadar tools can protect you against attacks?"  After ransomware attacks, victims are given instructions on how… Continue Reading

October 1, 2021

Why You Should Care About Ransomware

With a statement from FBI officials on August 25, it was said that a newly formed ransomware group "Hive" is attacking the health system in the USA. The Hive ransomware gang crashed the IT systems… Continue Reading

September 29, 2021

What is RedLine Stealer and What Can You Do About it?

RedLine Stealer (a.k.a. RedLine) is malicious software that can be bought from $150 - $200 depending on the version on hacker forums. RedLine can steal data and infect operating systems with malware. In general, cybercriminals… Continue Reading

September 28, 2021

What is Cybersquatting and How to Prevent it?

Cybersquatting (also known as domain squatting or typosquatting) is a specific type of cybercrime covered. In the US, the Anti-CybersQuatting Consumer Protection Act (ACpa) defines cybersquatting as the opportunistic practice of registering, trading or using… Continue Reading

How to Prevent Attacks by APT Groups Using SOCRadar
September 24, 2021

How to Prevent Attacks by APT Groups Using SOCRadar

What is an APT Group? The advanced persistent threat (APT) is a stealthy method to gain access to your company’s data. It requires a high degree of secrecy, skill, and patience – which is why… Continue Reading

socradar blog post on Lockbit ransomware
August 2, 2021

The Story of Lockbit Ransomware

After penetrating the network, the attackers take several steps to ensure that the Ransomware attack is successful. They want to infect as many systems as possible, stop business processes and urge victims to pay ransom.… Continue Reading

May 13, 2021

How to detect if your IP addresses are being used in DHT Networks?

Peer-to-peer networks are still being used in many parts of the World to download music, software, or movies. In its heyday peer 2 peer traffic was driving a considerable chunk of internet traffic.  A 2018 estimate… Continue Reading

March 1, 2021

Shadow IT Explained: What Are the Risks and How Can You Mitigate Them?

A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading

February 22, 2021

Your Third-Party Is Now Your Weakest Link. How To Guard It?

The news of the state-sponsored attacks last year on up to 18,000 customers of the SolarWinds is just worsening. The SolarWinds attacks were confirmed by the New York Times to have infiltrated, as was first… Continue Reading

December 21, 2020

All You Need To Know About Open Source Threat Intelligence Sharing Platform: MISP

Threat intelligence platforms (TIP) are critical security tools that use global security data to help proactively identify, mitigate, and remediate security threats. Every day there are unique and ever-changing challenges. Whilst security experts know that… Continue Reading


powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo