SOCRadar® Cyber Intelligence Inc. | How to Identify Spear Phishing?
Mar 25, 2022
How to Identify Spear Phishing?

How to Identify Spear Phishing? Successful spear phishing accounts for up to 95 percent of all attacks on enterprise networks. Because of the proliferation of COVID-19, attacks escalated in 2020, with...

Learn More
SOCRadar® Cyber Intelligence Inc. | Telegram: A New Place for Hackers
Mar 24, 2022
Telegram: A New Place for Hackers

Telegram: A New Place for Hackers One of the most commonly used messaging apps, Telegram, has become more and more popular ever since the privacy policy scandal of WhatsApp in January 2021. WhatsApp a...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Prevent Credential Stuffing Attacks?
Mar 08, 2022
How to Prevent Credential Stuffing Attacks?

How to Prevent Credential Stuffing Attacks? We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Si...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is an Accellion Cyber Attack?
Feb 05, 2022
What is an Accellion Cyber Attack?

What is an Accellion Cyber Attack? Accellion specializes in file sharing and collaboration software that is safe and secure. More than 3,000 multinational enterprises, government organizations, hospit...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Smishing Attack?
Feb 02, 2022
What is a Smishing Attack?

What is a Smishing Attack? Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Cryptocurrency Mining Malware?
Jan 13, 2022
What is Cryptocurrency Mining Malware?

What is Cryptocurrency Mining Malware? A cryptocurrency is a form of digital currency stored on decentralized networks. These decentralized networks are called blockchains, consisting of many systems ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Protect Employees Against Phishing Attacks?
Jan 07, 2022
How to Protect Employees Against Phishing Attacks?

How to Protect Employees Against Phishing Attacks? The Cybersecurity and Infrastructure Security Agency (CISA) has mentioned in Avoiding Social Engineering and Phishing Attacks on August 25, 2020; an ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
Dec 21, 2021
What is BYOD Policy?: Practices to Help Keep Your Network Secure in 20...

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022 If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, th...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability
Nov 30, 2021
What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulne...

What Do You Need to Know About Apache HTTP Server CVE-2021-41773 Vulnerability One of the world’s most significant open-source projects, Apache is a free and open-source cross-platform HTTP web server...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Protect Against Digital Risks in Three Steps
Nov 22, 2021
How to Protect Against Digital Risks in Three Steps

How to Protect Against Digital Risks in Three Steps For many organizations, digital initiatives are a lifeline. IoT, social, machine learning, big data analytics, artificial intelligence, and augmente...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Private is Your VPN?
Nov 18, 2021
How Private is Your VPN?

How Private is Your VPN? The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide y...

Learn More
SOCRadar® Cyber Intelligence Inc. | Why Do Organizations Need IAM?
Nov 17, 2021
Why Do Organizations Need IAM?

Why Do Organizations Need IAM? Identity and access management (IAM) is a discipline to ensure that the right people and job roles (identities) can access the tools they need in the organization. The e...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is External Attack Surface Management?
Nov 15, 2021
What is External Attack Surface Management?

What is External Attack Surface Management? The attack surface is all hardware, software and cloud assets accessible from the internet that processes or stores data. All exposed IT assets, from server...

Learn More
SOCRadar® Cyber Intelligence Inc. | A Rising Threat in Mobile: What is Banking Malware?
Nov 11, 2021
A Rising Threat in Mobile: What is Banking Malware?

A Rising Threat in Mobile: What is Banking Malware? Mobile Banking malware is a malware family consisting of malicious apps and trojans designed to infect one’s system and collect financial data, pers...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Ransomware Groups Use Tor-Based Backdoors
Oct 27, 2021
How Ransomware Groups Use Tor-Based Backdoors

How Ransomware Groups Use Tor-Based Backdoors In various incidents, threat actors leveraged Tor and Onion Services to create backdoors that gave them ongoing access to compromised networks. In this bl...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Extended Detection and Response (XDR)?
Oct 26, 2021
What is Extended Detection and Response (XDR)?

What is Extended Detection and Response (XDR)? Extended Detection and Response (XDR) is a security technology that delivers comprehensive visibility into data across networks and clouds in addition to...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Is Ransomware-as-a-Service (RaaS)?
Oct 22, 2021
What Is Ransomware-as-a-Service (RaaS)?

What Is Ransomware-as-a-Service (RaaS)? While informing you about ransomware since the beginning of October, we talked about how lucrative “E-crime” has become. With this information in mind, it’s cru...

Learn More
SOCRadar® Cyber Intelligence Inc. | Who Is the BlackByte Ransomware Group and How Does the Decryptor Works?
Oct 20, 2021
Who Is the BlackByte Ransomware Group and How Does the Decryptor Works...

Who Is the BlackByte Ransomware Group and How Does the Decryptor Works? Ransomware attacks impact organizations every single day. But it doesn’t always have to be bad news. Victims of BlackByte ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Why Do States Take Various Steps to Stop Ransomware Attacks?
Oct 15, 2021
Why Do States Take Various Steps to Stop Ransomware Attacks?

Why Do States Take Various Steps to Stop Ransomware Attacks? Thirty-one countries and European Union’s representatives involved in a two-day “ransomware summit” led by the US have released a joint sta...

Learn More
SOCRadar® Cyber Intelligence Inc. | ​​What Is Babuk? The Ransomware Gang You Should Know About
Oct 14, 2021
​​What Is Babuk? The Ransomware Gang You Should Know About

​​What Is Babuk? The Ransomware Gang You Should Know About [Update] January 10, 2024: “Babuk Tortilla Ransomware Variant Decrypted” Babuk, also known internally as Babyk, initially “Vasa Locker,” is a...

Learn More