Showing results for: Changing password

52 results found
May 2023 Cyberwatch Recap: A Month in Cybersecurity
June 22, 2023

May 2023 Cyberwatch Recap: A Month in Cybersecurity

Welcome to our May Cyberwatch blog post. Following our latest webinar, we delve into the notable cyber incidents from the past month. May 2023 saw a surge in ransomware, malware threats, and data leaks, unprecedentedly… Continue Reading

Investigating APT Groups' Attempts to Reuse Old Threat Indicators
June 21, 2023

Investigating APT Groups’ Attempts to Reuse Old Threat Indicators

Introduction The landscape of cybersecurity is a complex and evolving battleground. In this arena, Advanced Persistent Threat (APT) groups are the master tacticians, continuously adapting and employing new methods to breach defenses and fulfill their malicious agendas.… Continue Reading

Dark Web Profile: LockBit 3.0 Ransomware
April 27, 2023

Dark Web Profile: LockBit 3.0 Ransomware

[Update] August 31, 2023: See the subheading: “LockBit’s Operational Struggles, Empty Threats, and Sudden Surge.” [Update] July 03, 2023: LockBit claimed to hack Taiwan Semiconductor Manufacturing Company (TSMC), but TSMC clarified that only one of… Continue Reading

What's Next for Cybercrime Ecosystem After Genesis Market Takedown?
April 11, 2023

What’s Next for Cybercrime Ecosystem After Genesis Market Takedown?

One can desire the forbidden, as is the narrative in the Genesis chapter of the Old Testament. In today's digital world, the means of approaching the forbidden are underground markets. One of the most important… Continue Reading

How to Protect Yourself from Cyber Attacks During Tax Season?
March 7, 2023

How to Protect Yourself from Cyber Attacks During Tax Season?

Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman's supervillain Joker will stay out of the way of the IRS. However, the IRS's frightening… Continue Reading

Security Misconfigurations Caused 35% of All Time Cyber Incidents
February 28, 2023

Security Misconfigurations Caused 35% of All Time Cyber Incidents

By SOCRadar Research Security misconfiguration is the vulnerability that arises when systems or applications are not configured properly, resulting in potential security risks. According to OWASP, in 90% of the applications they examined, they found… Continue Reading

Malware Analysis: LummaC2 Stealer
February 9, 2023

Malware Analysis: LummaC2 Stealer

By SOCRadar Research In our article about Stealer-as-a-Service, as the SOCRadar Research team, we looked at Lumma Stealer, a relatively new and unknown malware. During our research, we didn't find much information, so we did threat hunting… Continue Reading

Major Cyberattacks in Review: January 2023
February 7, 2023

Major Cyberattacks in Review: January 2023

Cybersecurity is a constantly changing concern because threats always evolve and adapt to new technology and trends. The first month of 2023 has seen numerous significant cyberattacks that had an impact on people, organizations, and governments all… Continue Reading

PayPal Reveals Credential Stuffing Attack That Affected 35K Users
January 20, 2023

PayPal Reveals Credential Stuffing Attack That Affected 35K Users

PayPal has disclosed that it was hit by a credential stuffing attack last month. The online payment platform notifies all users whose data has been compromised due to the attack.  Hackers carry out credential stuffing attacks using… Continue Reading

Dark Web Profile: Royal Ransomware
January 9, 2023

Dark Web Profile: Royal Ransomware

By SOCRadar Research Ransomware attacks have been rising in recent years, with the frequency of attacks increasing. In 2021, several high-profile ransomware attacks made headlines, such as the attack on the Colonial Pipeline. This attack resulted… Continue Reading

Top 10 Targeted Industries and Countries in 2022
December 23, 2022

Top 10 Targeted Industries and Countries in 2022

No matter the industry, cyberattacks can cause various problems, ranging from minor disruptions to significant losses or, even worse, lawsuits against your organization. Threat actors could target a business in any industry in hopes of… Continue Reading

November 4, 2022

RiskPrime: Digital Risk Protection

Digital Risk Protection RiskPrime Stay one step ahead of threat actors with actionable intelligence alerts. SOCRadar’s RiskPrime builds on industry-leading instant phishing domain identification, internet-wide scanning, and compromised credential detection technologies by aggregating and correlating… Continue Reading

November 4, 2022

AttackMapper: External Attack Surface Management

Attack Surface Management AttackMapper Gain visibility into your ever-growing attack surface. AttackMapper helps customers gain additional visibility and context regarding the severity of unknown external-facing digital assets in an automated manner. Our external attack surface… Continue Reading

MFA Bypass Techniques: How Does it Work?
October 31, 2022

MFA Bypass Techniques: How Does it Work?

Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various methods, such as brute force to pass this phase unauthorized. Authentication solutions are named… Continue Reading

Recent Attack Types Against Cloud Infrastructures
September 9, 2022

Recent Attack Types Against Cloud Infrastructures

Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading

Major Cyberattacks in Review: July 2022
August 22, 2022

Major Cyberattacks in Review: July 2022 

Today's world has many cyberattack targets, including large organizations, small businesses, and individuals. Any action, no matter how small, can put you in danger. Most of the cyber incidents from last month involved situations in… Continue Reading

Linux Malware RapperBot Brute Forcing SSH Servers
August 8, 2022

Linux Malware RapperBot Brute Forcing SSH Servers

RapperBot is an IoT botnet malware that has spread through brute force since it was first identified in June 2022. Over 3,500 unique IPs were utilized by the RapperBot to brute force into a rising… Continue Reading

What is Domain Hijacking and How to Prevent
July 26, 2022

What is Domain Hijacking and How to Prevent

Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading

Dark Web Threat Profile: pompompurin
July 21, 2022

Dark Web Threat Profile: pompompurin

[Update] June 26, 2023: BreachForums was seized by the FBI three months after the arrest of its administrator. Added the subheading “FBI Seizes BreachForums After Arrest of Admin.” [Update] June 20, 2023: Rival forums leak… Continue Reading

BPFdoor Malware Targets Linux Systems Unnoticed for Five Years
May 13, 2022

BPFdoor Malware Targets Linux Systems Unnoticed for Five Years

It turned out that the backdoor malware called BPFdoor, which cybersecurity researchers recently discovered, has been targeting Linux and Solaris systems for over five years. BPFdoor allows threat actors to remotely connect to a Linux… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo