Blog

Latest articles from SOCRadar

socradar-free-global-deepweb-report-of-september-2021-available-now
October 21, 2021

SOCRadar’s Free Global DeepWeb Report of September 2021 Available Now

The Global Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available for the first time! Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading

October 21, 2021

SOCRadar’s Free Americas DeepWeb Report of September 2021 Available Now

The Americas Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now avaible for the first time! Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading

October 13, 2021

SOCRadar’s Free Europe Regional DeepWeb Report of September 2021 Available Now

The Europe Regional Deep Web Report, which emerged with the research of the SOCRadar analyst team, is now avaible. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the European region… Continue Reading

socradar-free-apac-regional-deepweb-report-of-september-2021-available-now
October 11, 2021

SOCRadar’s Free APAC Regional DeepWeb Report of September 2021 Available Now

The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the APAC region are… Continue Reading

October 9, 2021

SOCRadar’s Free MEA Regional DeepWeb Report of September 2021 Available Now

The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the MEA region are included in the report. This report can be used free of charge in all sectoral studies. What's In the Report? SOCRadar, the early warning system for information security, analyzes thousands of deep web resources every day, including hacker forums and social channels. According to the… Continue Reading

July 19, 2021

The Most Dangerous of Their Kind Remote Code Execution (RCE) Attacks

 Remote Code Execution (RCE) is a class of software vulnerabilities. An RCE vulnerability allows a malicious actor to execute code of their choice over a LAN (WAN) or Internet on a remote machine. RCE belongs to… Continue Reading

June 28, 2021

How to Detect Your Network is Used by Botnets Without Touching Your Systems?

Malicious bots called "bad bots" not only evolve continually, but are very specific to certain applications, such as defense providers or even evasion tactics, as the talents and degree of development for humans and bots.… Continue Reading

June 24, 2021

Best OSINT Resources to Follow

One of the benefits of the cyber security is its openness to sharing. There is a good sense of community in the industry with people freely creating and sharing tools. In this blog post, we… Continue Reading

June 21, 2021

Comparing MEA (Middle East and Africa) and Europe against the Dark Web Threats

Companies that wish to safeguard customers and employees typically invest in Dark Web monitoring solutions to warn them if their compromised data are offered or sold on dark web forums since they cannot do so… Continue Reading

June 14, 2021

Did You Try SOCRadar Global DeepWeb Sonar Report Yet?

Unidentified attackers have apparently unlimited resources, pressuring security authorities to regularly evaluate all aspects of their security strategy. People, procedures and technology must be examined in order to guarantee that every important component is optimized… Continue Reading

June 7, 2021

Best Practices for External Attack Surface Management (ASM) with Use-Cases

 Gartner has predicted that by 2021, one-third of successful attacks on the enterprise will be through shadow IT resources and leaked sensitive information1.   According to Verizon’s DBIR (Data Breach Investigation Report) in 2021, 70%… Continue Reading

March 1, 2021

Shadow IT Explained: What Are the Risks and How Can You Mitigate Them?

A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading

by
January 10, 2021

Create More Effective SOC With the Mitre ATT&CK Framework

The ATT&CK framework is a powerful tool to improve cyber defence and to create a more effective SOC. According to the SANS report, the MITRE ATT&CK creates; The threat intelligence groups that are known to… Continue Reading

by
January 7, 2021

How Hackers Find Your CEO’s Password and Abuse It

Poor password habits are found everywhere, even in big companies despite the password policies required. The credential leak is one of the most common use cases for a variety of sectors, and enterprises have no… Continue Reading

by
December 13, 2020

Top Vulnerabilities Exploited in VPNs in 2020

In several VPN products worldwide, APTs target vulnerabilities. This is an ongoing activity directed at multinational organizations. Including government, military, academic, industry, and medical care industries. The open-source is well known for these vulnerabilities, and… Continue Reading

by
December 10, 2020

How To Learn Which 3rd Party Libraries Your Website Is Using?

Websites are the most critical assets and most important components of your business. They are a linking bridge between your products and services, and the potential targeted customers. With well designed and properly secured websites,… Continue Reading

by
November 25, 2020

How To Find Domain Ownership in the GDPR Era

Data protection regulations Data protection is an essential process in keeping important information safe and away from threat actor compromise. The criticality of this process is drastically increasing with the increase of data itself being… Continue Reading

by
transportation
November 1, 2020

Top Threat Intelligence Use Cases for Third-Party Risks: Supply Chain Attacks

A successful third-party risk program, which includes the various third-party sectors, ought to provide threat information. Detailed vulnerability information will then be used for defined attack scenarios to map hacker workflows. A recent survey conducted… Continue Reading

by
mobile shopping
October 18, 2020

Top Threat Intelligence Use Cases for the E-commerce Industry-II

Prevention of the landscape is no longer enough in today's cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases of… Continue Reading

by
Shopping online concept
October 12, 2020

Top Threat Intelligence Use Cases for the E-Commerce Industry-I

The prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases… Continue Reading

by
Newsletter

powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo