Latest articles from SOCRadar
Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunting is searching for new possible risks and vulnerabilities beyond recognized alerts or malicious… Continue Reading
Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breaches for cybersecurity experts and leaders worldwide. The report includes reviews of around 24,000 cybersecurity incidents that… Continue Reading
Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious threat to organizations. The numbers in the "Phishing Activity Trends Reports" of the last quarter… Continue Reading
The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading
Threat intelligence feeds on such a broad spectrum that sometimes you'd be surprised to hear where you can get relevant information. Often, it can be nearly impossible to keep track of everything because of the… Continue Reading
SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same type of content. One of the most notable features of the attack was that it quickly… Continue Reading
With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wireless communication networks, via embedded devices. This technology is called, simply the… Continue Reading
Cybersecurity is one of the main topics for business managers in today's world. The approach to cyber risks has changed from "maturity based" to "risk-based" over time. Managerial leaders want to know the cyber threats to… Continue Reading
In the cyber world that grows and develops with cumulative data accumulation, "small" and short-term data breaches that we think we can ignore from time to time may cause a crisis beyond our estimations. Unlike… Continue Reading
The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII are not sharing programs, tools, or software, but rather components and standards that… Continue Reading
Artificial Intelligence and Machine Learning: A Thriving Concept in the World of Cybersecurity There’s no question that artificial intelligence and machine learning are two major points of interest in technology in the 21st century. Everyone… Continue Reading
Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and espionage. As a result, cybersecurity approaches and solutions have become increasingly sophisticated and comprehensive… Continue Reading
SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platform, Vulnerability Management, Ticketing, and Team Meeting to better serve its customers. Thanks to these integrations, it helps you take action regarding… Continue Reading
By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U.S. and China. McAfee states cybercrimes accounted for 14% of the entire… Continue Reading
Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading
SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In addition, up-to-date notifications are provided for you to follow the spotlight actively. In… Continue Reading
The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading
Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control business networks because it provides an exclusive field that could allow attackers to… Continue Reading
[April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genesis as a result of Operation Cookie Monster. Since 2017, the Genesis… Continue Reading
Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading