SOCRadar: 'On The Radar' Newsletter
SOCRadar? Extended Threat Intelligence
Threat Intelligence enriched with External Attack Surface Management, Supply Chain, and Digital Risk Protection Services
The sixth edition of SOCRadar's "On The Radar" LinkedIn special newsletter is here. You'll find the latest cybersecurity news, solutions, and exclusive community announcements (webinars, events, etc.).
Hot Stories This Week
Amid the ongoing Israel-Palestine conflict, a notable upsurge of hacktivist collectives has emerged, announcing an unceasing barrage of digital assaults directed at a wide range of targets from both sides. This situation unfolds as a response to the ongoing Israel-Palestine conflict, which involves Palestinian militant groups led by Hamas initiating a large-scale offensive originating from the Gaza Strip and targeting Israel.
Although the cyber world sometimes seems like a stand-alone entity, it must be a reflection of the physical world, so just like the hacktivism resurgence that came with the Ukraine-Russia war, this sad conflict situation for humanity will also show an increasing business of war in the cyber world. With SOCRadar’s Cyber Threat Intelligence and Digital Risk Protection modules, you can effortlessly keep a constant watch on threat actor activities in Telegram channels.
SOCRadar’s Digital Risk Protection module makes it simple to monitor the actions of threat actors. The Dark Web Monitoring tab automatically provides pertinent information about products and technologies discovered within your digital assets. Conversely, Dark Web News shares significant updates from deep and dark web forums, social media platforms, and communication channels like Telegram, complete with screenshots and textual content.
You can also use SOCRadar Labs to measure your resistance to DoS attacks, which are the popular attack methods of hacktivist groups. Discover whether your data is at risk from threat actors and take steps to mitigate these risks in your digital assets. SOCRadar conducts routine internet scans to identify new Telegram groups where your company’s leaked data may be found. Moreover, it promptly alerts you to any information related to your organization. ?(Click here to read our LIVE BLOG.)
The U.S. Securities and Exchange Commission (SEC), a regulatory body responsible for overseeing securities markets and protecting investors, has recently introduced new rules regarding the disclosure of cybersecurity incidents. Cybersecurity professionals must grasp these changes, as they can significantly impact how companies approach incident response and reporting. The new rules by SEC mandate that companies promptly disclose any cybersecurity incidents that could have a material impact on their operations or financial condition. This change stems from a rising trend in cyber threats and their potential repercussions on businesses' financial stability.
-Companies must report material cybersecurity incidents within four business days via a Form 8-K.
-There is an emphasis on enhancing companies’ cybersecurity risk management and governance disclosures in annual reports on Form 10-K and Form 20-F.
-Companies must describe processes for assessing, identifying, and managing cybersecurity threats. This includes detailing how these processes integrate into the company’s overall risk management system, the involvement of third parties, and oversight of risks from third-party service providers.
-How these cyber-related measures fit into the company’s broader risk management strategies;
-If they collaborate with experts, consultants, auditors, or other external entities for these measures;
-There are systems to supervise and pinpoint prominent cyber risks when partnering with third-party service providers.
-There’s also a focus on board oversight and management’s role in assessing cybersecurity threats. Companies need to detail which board committee is responsible for cybersecurity risk oversight and how frequently the board discusses these risks.
-Any specific board committee or subcommittee handling oversight.
-The way the board or committee stays informed about these risks.
-Identifying key management roles or committees in charge of such risks and elaborating on their expertise.
-The mechanisms by which these entities stay updated and monitor the handling of cybersecurity incidents.
-Reporting structures between these entities and the board or its committees. (Click here to read more.)
Severe vulnerabilities in Citrix NetScaler and WinRAR are currently being exploited by threat actors targeting various entities, including government organizations.?
Researchers recently revealed active exploitation of CVE-2023-4966 in Citrix’s NetScaler ADC and Gateway appliances, while Google’s TAG has identified government-backed hacking groups exploiting CVE-2023-38831 in WinRAR. Attackers have exploited these vulnerabilities as zero-days, targeting users of NetScaler appliances to hijack their sessions and users of WinRAR to execute arbitrary code and infect systems with malware.
This blog post will explore the details of these vulnerabilities in NetScaler appliances, WinRAR, and available mitigation methods. We aim to provide a comprehensive understanding of the NetScaler and WinRAR vulnerabilities, shed light on the threat actors behind their exploitation, and guide readers through the latest developments in the cyber threat landscape. (Click here to read more.)
Significant events have recently transpired in the ransomware ecosystem, from the takedown of Trigona to the resurgence of Hive Ransomware and the emergence of a new hackers’ hub. In the ongoing cyber battle, staying well-informed about the latest ransomware incidents is imperative to fortify your cybersecurity defenses.?
This blog post will provide an informative overview of these recent ransomware events, offering a fresh perspective on the ransomware threat landscape. In a world where the ransomware landscape is constantly in flux, staying informed is your best defense. Cybercriminals adapt swiftly, and so must our defenses.
领英推荐
With SOCRadar Dark Web News, you stay updated on the latest threats and trends emerging within the threat actors’ communities, enabling you to proactively safeguard your assets and organization. Furthermore, SOCRadar’s Threat Actor & Malware tracking feature furnishes you with detailed insights into these threats, including current and new ransomware threats. Empowering yourself with knowledge represents the primary step in fortifying your digital realm. Confronted with ever-changing ransomware threats, ongoing vigilance, proactive defense, and real-time threat intelligence access can significantly enhance your cybersecurity posture. (Click here to read more.)
In the ever-evolving cybersecurity landscape, staying ahead of threats is paramount for security professionals. SolarWinds Access Rights Manager (ARM), a comprehensive access management solution, has recently been the focus due to multiple discovered vulnerabilities. This post provides a quick look at these vulnerabilities, emphasizing the critical ones, their severity, and implications.
SolarWinds ARM is instrumental for organizations, simplifying, managing, and auditing user access rights across various IT environments. Its role-based access control, Active Directory integration, and visual feedback capabilities are particularly significant. However, discovering eight vulnerabilities, with three deemed critical, has alerted users and cybersecurity professionals.
These discoveries reinforce the necessity for continuous vigilance and proactive measures in cybersecurity. Tools like SOCRadar’s Vulnerability Intelligence can be crucial in real-time threat detection and maintaining robust security postures. By leveraging such advanced solutions, organizations can better navigate the complexities of vulnerabilities, regardless of discrepancies in external ratings, ensuring fortified security protocols and immediate response to potential threats. (Click here to read more.)
Hot Events Last Week
#AISA Annual #Cybersecurity Summit 2023: ??This year's summit attracted over 150 companies and business leaders with insights and best practices taught by the industry’s experts through keynotes, panel sessions, and live in-person demonstrations; this year was one of AISA's most prominent events. For three days, we had the opportunity to meet with vendors from many parts of the world and actors with whom we are involved in the cyber security market to exchange ideas and to better explain SOCRadar's unique solutions. See you next year!
Roundtable with BThaber Gazetesi: At the CxO Roundtable organized by BTHaber for the 35th time, we met with C-level IT managers from 15 different industries and listened to the current structures, regulations, and expectations of cybersecurity and threat intelligence. Afterward, our CISO, Ensar Seker, shared our unique SOCRadar solutions.
New Country Report: Australia Threat Landscape Report
?? Australia, a thriving economic powerhouse in the Asia Pacific, is facing unprecedented cyber threats. Cyber attackers have intensified their efforts as businesses grapple with the digital revolution, causing public and private sectors concern.
Sneak Peek of Our FREE Report:
Our comprehensive report delves deep into the Australian cyber threat landscape, spanning September 2022 to August 2023. Here's a sneak peek at the key findings:
Dark Web Activities: We uncovered 274 posts mentioning Australia, primarily focused on data sharing and selling. Electronic Shopping, Information, Finance & Insurance, and Retail Trade are the most targeted industries.
Ransomware Attacks: Witnessed 76 ransomware attacks by 22 distinct ransomware groups targeting Australian organizations. Information, Healthcare, and Professional Scientific & Technical Services sectors top the list.
Phishing Threats: The number of phishing domains impersonating Australian organizations has risen, with most now secured by HTTPS.
Data Breaches: Large-scale data breaches affected a significant portion of the Australian population, prompting crucial actions by the Australian government.
The statistics show cybersecurity is not a choice but a necessity in Australia. With cyber threats evolving rapidly, our report seeks to raise awareness among Australian organizations, empowering them to defend against these challenges. It also sheds light on the Australian government's pivotal steps in response to the escalating cyber risks.
Product Insights: Meet SOCRadar Mobile
If you are one of our valuable +10,000 subscribers, SOCRadar's mobile app is now available for download. Just search "SOCRadar Mobile" on Google Play and the App Store! And for starting to use, check the "Account Settings" on the Platform homepage now! You can log in using a QR code there.
SOCRadar in the Press