Blog

Latest articles from SOCRadar

Digital sphere
October 22, 2020

Top Threat Intelligence Use Cases for the Insurance Industry

In the past couple of years, privacy irregularities in insurance providers have disclosed more than 100 million people's personal privacy. In general, the insurance industry faces cyber threats from both internal and external sources, including… Continue Reading

by
mobile shopping
October 18, 2020

Top Threat Intelligence Use Cases for the E-commerce Industry-II

Prevention of the landscape is no longer enough in today's cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases of… Continue Reading

by
communication-technology-internet-business-global-
October 16, 2020

Different Definitions of Threat Intelligence and Gartner’s Perspective

Cyber threat intelligence defined Cyber threat intelligence is information and intelligence gathered from outside sources, required in taking internal actions. With relevant and real-time intelligence, it helps organizations of different sizes, carry out protective measures,… Continue Reading

by
Shopping online concept
October 12, 2020

Top Threat Intelligence Use Cases for the E-Commerce Industry-I

The prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases… Continue Reading

by
technical financial graph on technology abstract background
October 5, 2020

Top Threat Intelligence Use Cases for the Finance Sector-II

Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indiscriminate attacks, which is the price of simply being an online enterprise. At… Continue Reading

by
October 1, 2020

Using Google Dorks for Threat Intelligence Operations

Enterprises have to deal with a range of mass campaigns as well as advanced attacks that target a specific industry or company. Threat actors use ever-changing methods to reach their target, and always research before… Continue Reading

by
September 28, 2020

Top Threat Intelligence Use Cases for the Finance Sector-I

Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indiscriminate attacks, which is the price of simply being an online enterprise. At… Continue Reading

by
September 25, 2020

How Web Skimming Attacks Happen & What You Can Do to Protect Yourself

What is web skimming? The web skimming attack also referred to as online card skimming, steals credit card or payment information details from a website’s visitors when they make purchases or reservations. To achieve this,… Continue Reading

by
September 17, 2020

Using Cyber Kill Chain for Threat Intelligence

To block the attack vector, you need to know how an attacker thinks. The same idea applies to organizations that want to prevent cybercrimes. The consequences of a cyber attack can be devastating in terms… Continue Reading

by
September 14, 2020

How Expired Digital Certificates Can Be a Nightmare?

The need to protect corporate data from increasing cyberattacks continues to be the top priority of every organization. One of the most important ways to increase your company’s cybersecurity is to use digital certificates. Digital… Continue Reading

by
Connection Around Earth
September 11, 2020

Why Is It Important? East-West and North-South Traffic Security

Data centers are physical facilities designed to support your business applications, AI activities, file sharing, communications and collaboration services, and many more. They contain servers, storage systems, routers, firewalls, and other components which are crucial… Continue Reading

by
September 4, 2020

An Overview of Optiv CTI Estimate 2020: Attack Tools, Techniques and Procedures

The term Tools, Techniques and Procedures (TTPs) refers to a method used to evaluate the cyber activity or to identify a certain actor of threat. According to Optiv’s 2020 Cyber Threat Intelligence Estimate Report, relevant… Continue Reading

by
August 30, 2020

How to Build a SOC With Open Source Solutions?

The SOC is the information security department that continually tracks, analyzes, and enhances the security situation of an enterprise. The goal of the SOC team is, using technological solutions and powerful process management, to identify,… Continue Reading

by
August 27, 2020

How to Find Subdomains Using Free Online Services?

Subdomains are critical assets of your software applications and server infrastructure. They contain numerous details that can be useful to threat actors as a way into your system. In essence, a subdomain is simply an… Continue Reading

by
August 24, 2020

How to Empower Your SOC Teams with Cyber Threat Intelligence?

SOC teams have to monitor, analyze, and manage the great volumes of warnings and alerts created by the networks. It takes too long to go over and investigate these warnings and alerts. Too much alert… Continue Reading

by
August 16, 2020

What’s External Attack Surface Management? Absolute Beginner Guide

External attack surface management (ASM) is the process of discovering, listing, classifying, analyzing, prioritizing, and monitoring all information that can be collected on the internet and informing your organization about sensitive data by searching external… Continue Reading

by
August 10, 2020

Top 10 Threat Intelligence Certifications: Empower Your Analysis Skills

Threat Intelligence plays a key role in providing the relevant intelligence for companies to help them carry out protective measures and keep their confidentiality. This makes it a promising career path for cyber security enthusiasts.… Continue Reading

by
August 3, 2020

Different Types of Threat Intelligence: What is It & Who is It for?

The information provided by the threat intelligence, it makes a significant contribution to various business decisions in organizations. The information presented to the organization from an outside perspective is important to require action in internal… Continue Reading

by
July 27, 2020

How to Protect Your Online Brand?

Creating and developing an eminent brand image is a process that includes significant hard work for years, therefore it makes a very valuable asset of an organization. Not being able to protect it, puts your… Continue Reading

by
July 20, 2020

What’s MITRE PRE-ATT&CK and How To Use It in Threat Intelligence?

Founded in 1958, MITRE is a non-profit company whose mission is to solve the problem of a safer world. A new curated knowledge base, known as MITRE ATT&CK, which stands for adversarial tactics, techniques, and… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo