Latest articles from SOCRadar

April 10, 2020

Different Kinds of Impersonating: Phishing & Domain Squatting

Phishing and domain squatting are commonly used by threat actors to achieve different kinds of goals against an organization. Among these goals are; Stealing personally identifiable information (PII) and selling it on black markets for… Continue Reading

February 5, 2020

Oops! Microsoft Lets Its SSL Certificate Expire Causing a Major Outage

On February 3rd, Microsoft Teams suffered outages following the expiration of one of its SSL certificates. Microsoft’s collaborative Slack-alike, Teams, bundles together a variety of Microsoft applications having over 20 million daily active users. This… Continue Reading

November 9, 2019

6 Benefits You Can Expect From Your Next Digital Risk Protection Solution

In case of a cybersecurity investment, it's not always possible to satisfy the board by repeatedly saying "better safe than sorry". Boards want to witness an understanding of the big-picture involving operations and financials as… Continue Reading

October 11, 2019

First Step to Zero Trust Strategy: Gain Visibility

Understanding the importance of Digital Asset Monitoring (DAM) is critical. Your adversaries spend the majority of their time doing discovery and mapping tasks to get the best ways for the attack. Therefore, to be one… Continue Reading

October 1, 2019

Defending Against Persistent Threats

Threat actors follow a series of events-called the “cyber kill chain framework” from defense perspective-to successfully infiltrate a network and either exfiltrate, destroy, or to cause business disruption. The lifecycle of an attack can be… Continue Reading

September 18, 2019

Responding to Risks of Finance Sector

Financial services companies in the world witnessed a sharp rise in data breaches which shows how the sector is under attack from threat actors. For example, in the UK, companies reported 145 breaches to FCA… Continue Reading


powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo