SOCRadar® Extended Cyber Threat IntelligenceWho is Tropic Trooper (APT23)?Discover how one of the most elusive Chinese state-sponsored groups, Tropic Trooper, impacts critical sectors across East Asia.6d ago6d ago
SOCRadar® Extended Cyber Threat IntelligenceHow Did a Global Cybersecurity Coalition Disrupt Infostealer Malware Operations?In a groundbreaking achievement for global cybersecurity, law enforcement agencies worldwide have united to dismantle the infamous Redline…Nov 1Nov 1
SOCRadar® Extended Cyber Threat IntelligenceExodus Marketplace: What Is This Emerging Dark Web Platform?While various dark web forums facilitate the exchange of sensitive data, Exodus sets itself apart as a new marketplace explicitly focused…Oct 25Oct 25
SOCRadar® Extended Cyber Threat IntelligenceTop 10 Breach and Attack Simulation (BAS) Software in 2024: How Can You Stay Ahead of Cyber Threats?From phishing campaigns to complex malware, cybercriminals have become highly sophisticated in penetrating networks and bypassing security…Oct 18Oct 18
SOCRadar® Extended Cyber Threat IntelligenceWhat Did We Learn from the Top 10 Cybersecurity Lessons in 2024 H1?The first half of 2024 has seen an unprecedented surge in cyberattacks. From the rise of ransomware to AI-driven threats, it’s clear that…Oct 11Oct 11
SOCRadar® Extended Cyber Threat IntelligenceWhat Are the Alternatives to Telegram?As Telegram introduces new AI-driven policies aimed at detecting and removing illegal content, a significant shift is taking place. Threat…Sep 27Sep 27
SOCRadar® Extended Cyber Threat IntelligenceWhy Is Fraud Protection Crucial for Your Business?In the past, banks relied on physical security measures to protect their assets. They invested in high-security vaults made from steel and…Sep 19Sep 19
SOCRadar® Extended Cyber Threat IntelligenceTop 10 Phishing Attack Trends in 2024In just the first quarter of this year, close to 964,000 phishing attacks were reported, with a noticeable rise in voice phishing, or…Sep 13Sep 13
SOCRadar® Extended Cyber Threat IntelligenceWhat Are the Examples of AI-Assisted Cyber Attacks?The rise of generative AI has opened new possibilities in cybercrime. As AI technologies rapidly advance, cybercriminals are leveraging…Sep 6Sep 6
SOCRadar® Extended Cyber Threat IntelligenceWhy Do Compromised Credentials Dominate in Data Breaches?Compromised credentials have emerged as the cornerstone of modern cyber threats, pivotal in data breaches across various industries. The…Aug 26Aug 26