Blog

Latest articles from SOCRadar

Attack Surface Management (ASM) in 10 Questions
May 19, 2022

Attack Surface Management (ASM) in 10 Questions

The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading

Growing Attack Surfaces and Examples
April 21, 2022

Growing Attack Surfaces and Examples 

Your organization's attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. This might involve flaws in your organization's personnel, physical, network,… Continue Reading

The Ultimate Guide to Brand Protection
April 20, 2022

The Ultimate Guide to Brand Protection

As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter the domain to use legitimate advances produced by corporations to bolster their… Continue Reading

New Cyber Threats Require New Security Solutions: External Attack Surface Management (EASM)
March 30, 2022

CISOs Guide to External Attack Surface Management (EASM)

The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomware rose to a level affecting the lives of ordinary people directly, thanks to the… Continue Reading

January 21, 2022

New Free Service from SOCRadar LABS: ‘External Attack Surface’

At SOCRadar LABS, we're proud to introduce a Free External Attack Surface service for cybersecurity professionals.  External attack surface monitoring of applications is the continuous practice of looking for vulnerabilities and anomalies that could take… Continue Reading

December 27, 2021

How to Minimize Your Attack Surface in 5 Ways

Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minimal as possible. Organizations must constantly monitor their attack surfaces to identify and… Continue Reading

What-is-a-Rootkit-and-How-to-Detect-it
December 24, 2021

What is a Rootkit and How to Detect It

A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can also infect the hardware and firmware of your… Continue Reading

October 21, 2021

Data Sales Are The Biggest Deep Web Threat In MEA Region

The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the MEA region are… Continue Reading

October 19, 2021

Countries More Affected by Cyber Attacks in September: China and Thailand

The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the APAC region are… Continue Reading

October 15, 2021

Ransomware Attacks on the Rise Around Europe

The Europe Regional Deep Web Report, which emerged with the research of the SOCRadar analyst team, is now available.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the European region… Continue Reading

October 11, 2021

Top Ransomware Group is LockBit 2.0 in the Americas

The Americas Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now avaible for the first time.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading

October 2, 2021

“Data Sales” is in the Lead at the Global Threat Landscape

The Global Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available for the first time.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading

July 19, 2021

The Most Dangerous of Their Kind Remote Code Execution (RCE) Attacks

 Remote Code Execution (RCE) is a class of software vulnerabilities. An RCE vulnerability allows a malicious actor to execute code of their choice over a LAN (WAN) or Internet on a remote machine. RCE belongs to… Continue Reading

June 28, 2021

How to Detect Your Network is Used by Botnets Without Touching Your Systems?

Malicious bots called "bad bots" not only evolve continually, but are very specific to certain applications, such as defense providers or even evasion tactics, as the talents and degree of development for humans and bots.… Continue Reading

June 24, 2021

Best OSINT Resources to Follow

One of the benefits of the cyber security is its openness to sharing. There is a good sense of community in the industry with people freely creating and sharing tools. In this blog post, we… Continue Reading

June 21, 2021

Comparing MEA (Middle East and Africa) and Europe against the Dark Web Threats

Companies that wish to safeguard customers and employees typically invest in Dark Web monitoring solutions to warn them if their compromised data are offered or sold on dark web forums since they cannot do so… Continue Reading

June 14, 2021

Did You Try SOCRadar Global DeepWeb Sonar Report Yet?

Unidentified attackers have apparently unlimited resources, pressuring security authorities to regularly evaluate all aspects of their security strategy. People, procedures and technology must be examined in order to guarantee that every important component is optimized… Continue Reading

June 7, 2021

Best Practices for External Attack Surface Management (ASM) with Use-Cases

 Gartner has predicted that by 2021, one-third of successful attacks on the enterprise will be through shadow IT resources and leaked sensitive information1.   According to Verizon’s DBIR (Data Breach Investigation Report) in 2021, 70%… Continue Reading

March 1, 2021

Shadow IT Explained: What Are the Risks and How Can You Mitigate Them?

A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading

by
January 10, 2021

Create More Effective SOC With the Mitre ATT&CK Framework

The ATT&CK framework is a powerful tool to improve cyber defence and to create a more effective SOC. According to the SANS report, the MITRE ATT&CK creates; The threat intelligence groups that are known to… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo