SOCRadar® Cyber Intelligence Inc. | DarkGate Malware: Exploring Threats and Countermeasures
Feb 29, 2024
DarkGate Malware: Exploring Threats and Countermeasures

DarkGate Malware: Exploring Threats and Countermeasures As we get increasingly digitized, the threat posed by malware has reached unprecedented levels in parallel. From individual users to large corpo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using Jupyter Notebook for CTI using PyMISP
Feb 21, 2024
Using Jupyter Notebook for CTI using PyMISP

Using Jupyter Notebook for CTI using PyMISP In Cyber Threat Intelligence (CTI), Jupyter Notebook and PyMISP are transformative tools. Just as Bash commands empower defenders, these platforms offer dyn...

Learn More
SOCRadar® Cyber Intelligence Inc. | ‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak
Sep 07, 2023
‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak...

‘Classified’ Intel on the ‘Public’ Telegram Channel: Pentagon US Leak In the rapidly evolving landscape of digital communication, Telegram has emerged as a prominent platform for various user groups f...

Learn More
SOCRadar® Cyber Intelligence Inc. | QakBot, One of The Most Observed Malware
Aug 31, 2023
QakBot, One of The Most Observed Malware

QakBot, One of The Most Observed Malware [Update] February 16, 2024: “New Qbot Malware Variant Uses Evasion Techniques” [Update] November 22, 2023: See the subheading “Possible Successors of QakBot: D...

Learn More
SOCRadar® Cyber Intelligence Inc. | Raccoon Stealer Resurfaces with New Enhancements
Aug 24, 2023
Raccoon Stealer Resurfaces with New Enhancements

Raccoon Stealer Resurfaces with New Enhancements The developers behind the information-stealing malware, Raccoon Stealer, have broken their six-month silence on hacker forums. They are now promoting a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files
Aug 18, 2023
Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files

Telegram Channels Unveiled: The Hidden Dangers Lurking in Shared Files In today’s interconnected world, cyberspace has become a breeding ground for legitimate and malicious activities; Telegram, a pop...

Learn More
SOCRadar® Cyber Intelligence Inc. | Possible Cyber Threats in the 2024 Olympics
Aug 16, 2023
Possible Cyber Threats in the 2024 Olympics

Possible Cyber Threats in the 2024 Olympics The design of the Paris 2024 Olympic and Paralympic torch, introduced on July 25, 2023, struck the first gong for The Paris 2024 Summer Olympic and Paralymp...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is EMOTET Malware and How to Protect Yourself
Aug 11, 2023
What is EMOTET Malware and How to Protect Yourself

What is EMOTET Malware and How to Protect Yourself According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attac...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Mindset Behind Phishing Campaigns
Jun 29, 2023
The Mindset Behind Phishing Campaigns

The Mindset Behind Phishing Campaigns Phishing attacks are cybercrimes that target individuals, businesses, and organizations. These attacks use deception and manipulation techniques to trick victims ...

Learn More
SOCRadar® Cyber Intelligence Inc. | RDP Access Sales on Dark Web Forums Detected by SOCRadar
Jun 29, 2023
RDP Access Sales on Dark Web Forums Detected by SOCRadar

RDP Access Sales on Dark Web Forums Detected by SOCRadar Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection...

Learn More
SOCRadar® Cyber Intelligence Inc. | CSP Bypass Unveiled: The Hidden Threat of Bookmarklets
Jun 01, 2023
CSP Bypass Unveiled: The Hidden Threat of Bookmarklets

CSP Bypass Unveiled: The Hidden Threat of Bookmarklets A bookmarklet is a primitive version of browser extensions commonly used today. It consists of a bookmark that contains JavaScript code. These bo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Google's New ZIP Domain Could Be Used for Phishing and Malware Attacks
May 29, 2023
Google's New ZIP Domain Could Be Used for Phishing and Malware Attacks

Google’s New ZIP Domain Could Be Used for Phishing and Malware Attacks Security researchers have found how attackers could potentially exploit the new ZIP TLD offered by Google. A new ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Phishing Kit?
Apr 06, 2023
What is a Phishing Kit?

What is a Phishing Kit? A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with li...

Learn More
SOCRadar® Cyber Intelligence Inc. | How SOCRadar Can Help Fraud Teams?
Apr 04, 2023
How SOCRadar Can Help Fraud Teams?

How SOCRadar Can Help Fraud Teams? Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Stop a DDoS Attack? (2023 Edition)
Mar 03, 2023
How to Stop a DDoS Attack? (2023 Edition)

How to Stop a DDoS Attack? (2023 Edition) ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
Oct 06, 2022
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need to Know About New SAMA Principles?
Jun 08, 2022
What Do You Need to Know About New SAMA Principles?

What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are Threat Hunting Tools?
Jun 02, 2022
What are Threat Hunting Tools?

What are Threat Hunting Tools? Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunt...

Learn More
SOCRadar® Cyber Intelligence Inc. | Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
Jun 01, 2022
Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breach...

Learn More
SOCRadar® Cyber Intelligence Inc. | 8 Ways to Prevent Supply Chain Attacks
May 03, 2022
8 Ways to Prevent Supply Chain Attacks

8 Ways to Prevent Supply Chain Attacks Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others...

Learn More