Showing results for: Changing password

52 results found
May 10, 2023

Ever-Changing Tactics on Social Engineering

In today's digital age, cyber threats are becoming increasingly common, and one of the most prevalent types of attacks is phishing. Phishing involves tricking people into giving away their personal or confidential information by posing… Continue Reading

What is Password Analyzer?
November 11, 2022

What is Password Analyzer?

A password strength checker is an online application that assesses the security of a user’s password in real-time by analyzing its grammar and highlighting possible vulnerabilities.  The program verifies the usage of certain sequences of… Continue Reading

January 7, 2021

How Hackers Find Your CEO’s Password and Abuse It

Poor password habits are found everywhere, even in big companies despite the password policies required. The credential leak is one of the most common use cases for a variety of sectors, and enterprises have no… Continue Reading

by
Third-Party Breach Led to Exposure of 9M AT&T Customers’ Information
March 10, 2023

Third-Party Breach Led to Exposure of 9M AT&T Customers’ Information

Recently, AT&T revealed that a data breach in January compromised the personal information of about 9 million of their customers. The breach was caused by a marketing vendor's hack, and as a result, some Customer Proprietary Network Information (CPNI) was accessed.… Continue Reading

MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’
September 15, 2023

MGM Resorts Hacked by BlackCat Affiliate, ‘Scattered Spider’

A cybercriminal gang employing a combination of impersonation and malware is the prime suspect behind the cyberattack that crippled the operations of MGM Resorts. MGM Resorts is a hospitality giant with numerous hotels and casinos… Continue Reading

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection
September 4, 2023

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection

Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching coordinated efforts to combat ransomware groups through law enforcement takedowns, cryptocurrency seizures, and indictments, the crime continues to… Continue Reading

QakBot, One of The Most Observed Malware
August 31, 2023

QakBot, One of The Most Observed Malware

Qakbot, a versatile second-stage malware endowed with backdoor capabilities, was initially designed as a credential stealer. Remarkably, it remained operational till present day. It is so relevant that in ProofPoint's 2022 Phishing report, along with… Continue Reading

Navigating Cloud Vulnerabilities: Challenges and Solutions
August 24, 2023

Navigating Cloud Vulnerabilities: Challenges and Solutions

The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer's hard drive. It has become an integral part of modern organizations,… Continue Reading

Ransomware Chronicles: Unveiling the Monthly Trends in 2023
August 22, 2023

Ransomware Chronicles: Unveiling the Monthly Trends in 2023

Welcome to our “Ransomware Trends in 2023: A Live Blog of Insights and Analysis.” This live blog delves into the intricate world of ransomware, providing timely updates and valuable statistics on the prevailing trends shaping… Continue Reading

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks
August 21, 2023

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks

In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Information Security Officers (CISOs). Dark Web is a mysterious and often misunderstood part of the internet… Continue Reading

Dark Web Profile: Bjorka
August 17, 2023

Dark Web Profile: Bjorka

In the ever-evolving landscape of cyber threats, understanding the profiles of individual threat actors is crucial for both governments and private organizations to take action before major incidents happen. One such actor that has recently… Continue Reading

August 16, 2023

The Rising Anxiety Over LinkedIn Account Takeover Claims

In an age dominated by the digital, online platforms like LinkedIn have become vital components of our professional identities. But as we increasingly rely on these tools, concerns about their security inevitably rise. Recently, murmurs… Continue Reading

Patch Available for Important LPE Vulnerability in VMware Tools
July 25, 2023

VMware Responses to the Critical CVE-2023-20891 Vulnerability Exposing CF API Admin Credentials

Virtual machines have revolutionized the world of cybersecurity, offering a myriad of benefits to cybersecurity professionals. They enable professionals to simulate real-world attack scenarios, conduct vulnerability testing, and analyze malware in a safe and controlled… Continue Reading

Under the Spotlight State of Evolving Australian Threat Landscape in 2023
July 14, 2023

Under the Spotlight: State of Evolving Australian Threat Landscape in 2023

While cyber-attacks gain momentum in parallel with the increase in digitalization, companies operating in both public and private sectors continue to experience the effects of cyber-attacks; what is concerning, if unsurprising, is the different forms… Continue Reading

Threat Actor Profile: BianLian, The Shape-shifting Ransomware Group
July 13, 2023

Threat Actor Profile: BianLian, The Shape-Shifting Ransomware Group

Nowadays, there is a rise in the number of ransomware groups with names that mean something. For example, Yanluowang is a deity in Chinese mythology, the god of death and the underworld judge. Some of… Continue Reading

Ransomware Attacks on Banking Industry
July 12, 2023

Ransomware Attacks on Banking Industry

Due to the escalating illicit pursuits of cybercriminals seeking unlawful financial gains, particular sectors and specific types of cyber attacks tend to gain prominence.  The financial sector, including the banking industry, consistently remains a primary… Continue Reading

The Mindset Behind a Phishing Campaign
June 29, 2023

The Mindset Behind Phishing Campaigns

Phishing attacks are cybercrimes that target individuals, businesses, and organizations. These attacks use deception and manipulation techniques to trick victims into performing actions to compromise their sensitive information. Understanding the mindset behind a phishing attack is crucial… Continue Reading

June 29, 2023

RDP Access Sales on Dark Web Forums Detected by SOCRadar

Remote Desktop Protocol, or RDP, is a protocol developed by Microsoft. It allows the user to control another computer over a network connection. RDP is one of the most common tools for managing remote machines.… Continue Reading

APT Profile: Turla
June 29, 2023

APT Profile: Turla

In the digital age, war has transitioned into the virtual world, where many types of cybercriminals, such as hacktivists and nation-state actors, are called Advanced Persistent Threats (APT) play a role in this type of… Continue Reading

June 28, 2023

Using OSINT to Strengthen Organizational Security

Open-source intelligence or “OSINT” is collecting and analyzing data gathered from publicly available open sources (social media, news, dark web, etc.) to produce actionable intelligence crucial to organizational security. A wide range of individuals and… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo