Latest articles from SOCRadar
The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading
Your organization's attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. This might involve flaws in your organization's personnel, physical, network,… Continue Reading
As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter the domain to use legitimate advances produced by corporations to bolster their… Continue Reading
The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomware rose to a level affecting the lives of ordinary people directly, thanks to the… Continue Reading
At SOCRadar LABS, we're proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surface monitoring of applications is the continuous practice of looking for vulnerabilities and anomalies that could take… Continue Reading
Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minimal as possible. Organizations must constantly monitor their attack surfaces to identify and… Continue Reading
A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can also infect the hardware and firmware of your… Continue Reading
The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the MEA region are… Continue Reading
The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the APAC region are… Continue Reading
The Europe Regional Deep Web Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the European region… Continue Reading
The Americas Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now avaible for the first time. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading
The Global Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available for the first time. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading
Remote Code Execution (RCE) is a class of software vulnerabilities. An RCE vulnerability allows a malicious actor to execute code of their choice over a LAN (WAN) or Internet on a remote machine. RCE belongs to… Continue Reading
Malicious bots called "bad bots" not only evolve continually, but are very specific to certain applications, such as defense providers or even evasion tactics, as the talents and degree of development for humans and bots.… Continue Reading
One of the benefits of the cyber security is its openness to sharing. There is a good sense of community in the industry with people freely creating and sharing tools. In this blog post, we… Continue Reading
Companies that wish to safeguard customers and employees typically invest in Dark Web monitoring solutions to warn them if their compromised data are offered or sold on dark web forums since they cannot do so… Continue Reading
Unidentified attackers have apparently unlimited resources, pressuring security authorities to regularly evaluate all aspects of their security strategy. People, procedures and technology must be examined in order to guarantee that every important component is optimized… Continue Reading
Gartner has predicted that by 2021, one-third of successful attacks on the enterprise will be through shadow IT resources and leaked sensitive information1. According to Verizon’s DBIR (Data Breach Investigation Report) in 2021, 70%… Continue Reading
A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading
The ATT&CK framework is a powerful tool to improve cyber defence and to create a more effective SOC. According to the SANS report, the MITRE ATT&CK creates; The threat intelligence groups that are known to… Continue Reading