Welcome to our May Cyberwatch blog post. Following our latest webinar, we delve into the notable cyber incidents from the past month. May 2023 saw a surge in ransomware, malware threats, and data leaks, unprecedentedly… Continue Reading
Introduction The landscape of cybersecurity is a complex and evolving battleground. In this arena, Advanced Persistent Threat (APT) groups are the master tacticians, continuously adapting and employing new methods to breach defenses and fulfill their malicious agendas.… Continue Reading
[Update] August 31, 2023: See the subheading: “LockBit’s Operational Struggles, Empty Threats, and Sudden Surge.” [Update] July 03, 2023: LockBit claimed to hack Taiwan Semiconductor Manufacturing Company (TSMC), but TSMC clarified that only one of… Continue Reading
One can desire the forbidden, as is the narrative in the Genesis chapter of the Old Testament. In today's digital world, the means of approaching the forbidden are underground markets. One of the most important… Continue Reading
Not many sane persons in the US will go against the (Internal Revenue Service) IRS. Even some crazies like Batman's supervillain Joker will stay out of the way of the IRS. However, the IRS's frightening… Continue Reading
By SOCRadar Research Security misconfiguration is the vulnerability that arises when systems or applications are not configured properly, resulting in potential security risks. According to OWASP, in 90% of the applications they examined, they found… Continue Reading
By SOCRadar Research In our article about Stealer-as-a-Service, as the SOCRadar Research team, we looked at Lumma Stealer, a relatively new and unknown malware. During our research, we didn't find much information, so we did threat hunting… Continue Reading
Cybersecurity is a constantly changing concern because threats always evolve and adapt to new technology and trends. The first month of 2023 has seen numerous significant cyberattacks that had an impact on people, organizations, and governments all… Continue Reading
PayPal has disclosed that it was hit by a credential stuffing attack last month. The online payment platform notifies all users whose data has been compromised due to the attack. Hackers carry out credential stuffing attacks using… Continue Reading
By SOCRadar Research Ransomware attacks have been rising in recent years, with the frequency of attacks increasing. In 2021, several high-profile ransomware attacks made headlines, such as the attack on the Colonial Pipeline. This attack resulted… Continue Reading
No matter the industry, cyberattacks can cause various problems, ranging from minor disruptions to significant losses or, even worse, lawsuits against your organization. Threat actors could target a business in any industry in hopes of… Continue Reading
Digital Risk Protection RiskPrime Stay one step ahead of threat actors with actionable intelligence alerts. SOCRadar’s RiskPrime builds on industry-leading instant phishing domain identification, internet-wide scanning, and compromised credential detection technologies by aggregating and correlating… Continue Reading
Attack Surface Management AttackMapper Gain visibility into your ever-growing attack surface. AttackMapper helps customers gain additional visibility and context regarding the severity of unknown external-facing digital assets in an automated manner. Our external attack surface… Continue Reading
Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various methods, such as brute force to pass this phase unauthorized. Authentication solutions are named… Continue Reading
Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading
Today's world has many cyberattack targets, including large organizations, small businesses, and individuals. Any action, no matter how small, can put you in danger. Most of the cyber incidents from last month involved situations in… Continue Reading
RapperBot is an IoT botnet malware that has spread through brute force since it was first identified in June 2022. Over 3,500 unique IPs were utilized by the RapperBot to brute force into a rising… Continue Reading
Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading
[Update] June 26, 2023: BreachForums was seized by the FBI three months after the arrest of its administrator. Added the subheading “FBI Seizes BreachForums After Arrest of Admin.” [Update] June 20, 2023: Rival forums leak… Continue Reading
It turned out that the backdoor malware called BPFdoor, which cybersecurity researchers recently discovered, has been targeting Linux and Solaris systems for over five years. BPFdoor allows threat actors to remotely connect to a Linux… Continue Reading