SOCRadar® Cyber Intelligence Inc. | CSP Bypass Unveiled: The Hidden Threat of Bookmarklets
Jun 01, 2023
CSP Bypass Unveiled: The Hidden Threat of Bookmarklets

CSP Bypass Unveiled: The Hidden Threat of Bookmarklets A bookmarklet is a primitive version of browser extensions commonly used today. It consists of a bookmark that contains JavaScript code. These bo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Google's New ZIP Domain Could Be Used for Phishing and Malware Attacks
May 29, 2023
Google's New ZIP Domain Could Be Used for Phishing and Malware Attacks

Google’s New ZIP Domain Could Be Used for Phishing and Malware Attacks Security researchers have found how attackers could potentially exploit the new ZIP TLD offered by Google. A new ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Phishing Kit?
Apr 06, 2023
What is a Phishing Kit?

What is a Phishing Kit? A phishing kit is a set of software tools, such as HTML, pictures, and code that fraudsters can use to construct and launch phishing attacks. Phishing kits allow anyone with li...

Learn More
SOCRadar® Cyber Intelligence Inc. | How SOCRadar Can Help Fraud Teams?
Apr 04, 2023
How SOCRadar Can Help Fraud Teams?

How SOCRadar Can Help Fraud Teams? Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Stop a DDoS Attack? (2023 Edition)
Mar 03, 2023
How to Stop a DDoS Attack? (2023 Edition)

How to Stop a DDoS Attack? (2023 Edition) ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
Oct 06, 2022
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need to Know About New SAMA Principles?
Jun 08, 2022
What Do You Need to Know About New SAMA Principles?

What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are Threat Hunting Tools?
Jun 02, 2022
What are Threat Hunting Tools?

What are Threat Hunting Tools? Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunt...

Learn More
SOCRadar® Cyber Intelligence Inc. | Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
Jun 01, 2022
Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breach...

Learn More
SOCRadar® Cyber Intelligence Inc. | 8 Ways to Prevent Supply Chain Attacks
May 03, 2022
8 Ways to Prevent Supply Chain Attacks

8 Ways to Prevent Supply Chain Attacks Cyber-attacks against the supply chain ecosystems continued to ramp up through the year 2021 with high-profile attacks such as Log4j, Kaseya VSA, and many others...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Identify Spear Phishing?
Mar 25, 2022
How to Identify Spear Phishing?

How to Identify Spear Phishing? Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with...

Learn More
SOCRadar® Cyber Intelligence Inc. | Telegram: A New Place for Hackers
Mar 24, 2022
Telegram: A New Place for Hackers

Telegram: A New Place for Hackers One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp a...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Prevent Credential Stuffing Attacks?
Mar 08, 2022
How to Prevent Credential Stuffing Attacks?

How to Prevent Credential Stuffing Attacks? We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Si...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is an Accellion Cyber Attack?
Feb 05, 2022
What is an Accellion Cyber Attack?

What is an Accellion Cyber Attack? Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospit...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Smishing Attack?
Feb 02, 2022
What is a Smishing Attack?

What is a Smishing Attack? Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Cryptocurrency Mining Malware?
Jan 13, 2022
What is Cryptocurrency Mining Malware?

What is Cryptocurrency Mining Malware? A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Protect Employees Against Phishing Attacks?
Jan 07, 2022
How to Protect Employees Against Phishing Attacks?

How to Protect Employees Against Phishing Attacks? The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
Dec 21, 2021
What is BYOD Policy?: Practices to Help Keep Your Network Secure in 20...

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022 If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, th...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability
Nov 30, 2021
What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulne...

What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability One of the world’s most significant open-source projects, Apache is a free and open-source cross-platform HTTP web server...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Protect Against Digital Risks in Three Steps
Nov 22, 2021
How to Protect Against Digital Risks in Three Steps

How to Protect Against Digital Risks in Three Steps For many organizations, digital initiatives are a lifeline. IoT, social, machine learning, big data analytics, artificial intelligence, and augmente...

Learn More