Blog

Latest articles from SOCRadar

March 1, 2021

Shadow IT Explained: What Are the Risks and How Can You Mitigate Them?

A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading

by
January 10, 2021

Create More Effective SOC With the Mitre ATT&CK Framework

The ATT&CK framework is a powerful tool to improve cyber defence and to create a more effective SOC. According to the SANS report, the MITRE ATT&CK creates; The threat intelligence groups that are known to… Continue Reading

by
January 7, 2021

How Hackers Find Your CEO’s Password and Abuse It

Poor password habits are found everywhere, even in big companies despite the password policies required. The credential leak is one of the most common use cases for a variety of sectors, and enterprises have no… Continue Reading

by
December 13, 2020

Top Vulnerabilities Exploited in VPNs in 2020

In several VPN products worldwide, APTs target vulnerabilities. This is an ongoing activity directed at multinational organizations. Including government, military, academic, industry, and medical care industries. The open-source is well known for these vulnerabilities, and… Continue Reading

by
December 10, 2020

How To Learn Which 3rd Party Libraries Your Website Is Using?

Websites are the most critical assets and most important components of your business. They are a linking bridge between your products and services, and the potential targeted customers. With well designed and properly secured websites,… Continue Reading

by
November 25, 2020

How To Find Domain Ownership in the GDPR Era

Data protection regulations Data protection is an essential process in keeping important information safe and away from threat actor compromise. The criticality of this process is drastically increasing with the increase of data itself being… Continue Reading

by
transportation
November 1, 2020

Top Threat Intelligence Use Cases for Third-Party Risks: Supply Chain Attacks

A successful third-party risk program, which includes the various third-party sectors, ought to provide threat information. Detailed vulnerability information will then be used for defined attack scenarios to map hacker workflows. A recent survey conducted… Continue Reading

by
mobile shopping
October 18, 2020

Top Threat Intelligence Use Cases for the E-commerce Industry-II

Prevention of the landscape is no longer enough in today's cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases of… Continue Reading

by
Shopping online concept
October 12, 2020

Top Threat Intelligence Use Cases for the E-Commerce Industry-I

The prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases… Continue Reading

by
technical financial graph on technology abstract background
October 5, 2020

Top Threat Intelligence Use Cases for the Finance Sector-II

Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indiscriminate attacks, which is the price of simply being an online enterprise. At… Continue Reading

by
Newsletter

powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo