Blog

Latest articles from SOCRadar

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak
September 7, 2023

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak

In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups from underground circles. The channels, groups and private chat rooms established by threat actors have exponentially… Continue Reading

QakBot, One of The Most Observed Malware
August 31, 2023

QakBot, One of The Most Observed Malware

[Update] November 22, 2023: See the subheading "Possible Successors of QakBot: DarkGate and Pikabot." [Update] October 9, 2023: See the subheading: "Potential QakBot Resurgence." Qakbot, a versatile second-stage malware endowed with backdoor capabilities, was initially… Continue Reading

Raccoon Stealer Resurfaces with New Enhancements
August 24, 2023

Raccoon Stealer Resurfaces with New Enhancements

The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting an updated version of the 2.3.0 (2.3.0.1 since August 15, 2023) malware to potential cybercriminals.… Continue Reading

Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
August 18, 2023

Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files

In today's interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a popular messaging platform known for its security features, has not remained untouched by those with malicious intent. Recently,… Continue Reading

Possible Cyber Threats in the 2024 Olympics
August 16, 2023

Possible Cyber Threats in the 2024 Olympics

The design of the Paris 2024 Olympic and Paralympic torch, introduced on July 25, 2023, struck the first gong for The Paris 2024 Summer Olympic and Paralympic Games. With less than one year remaining until… Continue Reading

What is EMOTET Malware and How to Protect Yourself
August 11, 2023

What is EMOTET Malware and How to Protect Yourself

According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading

The Mindset Behind a Phishing Campaign
June 29, 2023

The Mindset Behind Phishing Campaigns

Phishing attacks are cybercrimes that target individuals, businesses, and organizations. These attacks use deception and manipulation techniques to trick victims into performing actions to compromise their sensitive information. Understanding the mindset behind a phishing attack is crucial… Continue Reading

June 29, 2023

RDP Access Sales on Dark Web Forums Detected by SOCRadar

Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection. RDP is one of the most common tools for managing remote machines.… Continue Reading

CSP Bypass Unveiled: The Hidden Threat of Bookmarklets
June 1, 2023

CSP Bypass Unveiled: The Hidden Threat of Bookmarklets

A bookmarklet is a primitive version of browser extensions commonly used today. It consists of a bookmark that contains JavaScript code. These bookmarklets have been employed since the early days of JavaScript for various purposes. They provide users… Continue Reading

Google's New ZIP Domain Could Be Used for Phishing and Malware Attacks
May 29, 2023

Google’s New ZIP Domain Could Be Used for Phishing and Malware Attacks

Security researchers have found how attackers could potentially exploit the new ZIP TLD offered by Google. A new phishing toolkit uses the ZIP domain to appear legitimate and displays fake WinRAR and Windows File Explorer windows in the browser. Google released… Continue Reading

What is a Phishing Kit?
April 6, 2023

What is a Phishing Kit?

A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with little or no phishing experience to… Continue Reading

How Can SOCRadar Help Fraud Teams
April 4, 2023

How SOCRadar Can Help Fraud Teams?

Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made by using fake or stolen credit cards. Today, with the advantages of the rapid digitalization… Continue Reading

How to Stop a DDoS Attack
March 3, 2023

How to Stop a DDoS Attack? (2023 Edition)

What is a DDoS Attack? A DDoS attack, also known as distributed denial of service attack, is a type of web attack aiming to cripple a web system's servers and make the servers unreachable to… Continue Reading

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
October 6, 2022

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries

People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and finance. Most financial services have been replaced by digital banking solutions known as fintech (financial technology), which… Continue Reading

What Do You Need to Know About New SAMA Principles?
June 8, 2022

What Do You Need to Know About New SAMA Principles?

The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of financial services, securing the availability of sensitive data, transactions, and services has become… Continue Reading

What are Threat Hunting Tools?
June 2, 2022

What are Threat Hunting Tools?

Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunting is searching for new possible risks and vulnerabilities beyond recognized alerts or malicious… Continue Reading

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
June 1, 2022

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breaches for cybersecurity experts and leaders worldwide. The report includes reviews of around 24,000 cybersecurity incidents that… Continue Reading

8 Ways to Prevent Supply Chain Attacks
May 3, 2022

8 Ways to Prevent Supply Chain Attacks

Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others. Attackers including APT actors have been observed to be attacking… Continue Reading

How to Identify Spear Phishing?
March 25, 2022

How to Identify Spear Phishing?

Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with hackers preying on stay-at-home workers who aren't protected by… Continue Reading

Telegram: A New Place for Hackers
March 24, 2022

Telegram: A New Place for Hackers

One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp announced that they have been sharing their customers’… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo