Blog

Latest articles from SOCRadar

Secure Your Cloud Environment: 5 Best Practices
January 3, 2023

Secure Your Cloud Environment: 5 Best Practices

With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to store, process, and manage their data. Cloud computing is a model for delivering computing services… Continue Reading

Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report
December 26, 2022

Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report

Gartner's report with comprehensive analysis and insights for endpoint security has been published. The Hype Cycle for Endpoint Security report aims to give organizations a perspective on why they should invest in these cybersecurity solutions while… Continue Reading

Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022
December 15, 2022

Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022

By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching for a way to breach defenses and expose what is underneath. During the Covid-19… Continue Reading

SOCRadar AttackMapper: Gartner-recommended EASM Solution
November 23, 2022

SOCRadar AttackMapper: Gartner-recommended EASM Solution

The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity market, was published on October 19, 2022. SOCRadar is also recognized as a recommended EASM… Continue Reading

Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management
November 14, 2022

Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management

In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks, data breaches, digital frauds, and ransomware attacks continue unabated. And it becomes more challenging to secure cyberspace.  To cope with… Continue Reading

A New Rising Social Engineering Trend: Callback Phishing
November 1, 2022

A New Rising Social Engineering Trend: Callback Phishing

Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sensitive data or transmit harmful packages via email and vishing, which applies phishing over the… Continue Reading

Cloud Security Module: Minimize Risk of Misconfigured Buckets
October 26, 2022

Cloud Security Module: Minimize Risk of Misconfigured Buckets

Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all digital assets -services, databases, IT resources, and apps- are now stored in the cloud. Of… Continue Reading

How to Detect Reconnaissance Using MITRE ATT&CK Framework
August 2, 2022

How to Detect Reconnaissance Using MITRE ATT&CK Framework

In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to detect cyberattacks using MITRE ATT&CK Framework, and how we can protect ourselves and… Continue Reading

Top 5 Free Attack Surface Management Tools
July 28, 2022

Top 5 Free Attack Surface Management Tools

Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization's IT infrastructure.  What is Attack Surface Management?  While similar in nature to asset discovery or asset management, frequently… Continue Reading

Attack Surface Management (ASM) in 10 Questions
May 19, 2022

Attack Surface Management (ASM) in 10 Questions

The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading

Growing Attack Surfaces and Examples
April 21, 2022

Growing Attack Surfaces and Examples 

Your organization's attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. This might involve flaws in your organization's personnel, physical, network,… Continue Reading

The Ultimate Guide to Brand Protection
April 20, 2022

The Ultimate Guide to Brand Protection

As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter the domain to use legitimate advances produced by corporations to bolster their… Continue Reading

New Cyber Threats Require New Security Solutions: External Attack Surface Management (EASM)
March 30, 2022

CISOs Guide to External Attack Surface Management (EASM)

The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomware rose to a level affecting the lives of ordinary people directly, thanks to the… Continue Reading

January 21, 2022

New Free Service from SOCRadar LABS: ‘External Attack Surface’

At SOCRadar LABS, we're proud to introduce a Free External Attack Surface service for cybersecurity professionals.  External attack surface monitoring of applications is the continuous practice of looking for vulnerabilities and anomalies that could take… Continue Reading

December 27, 2021

How to Minimize Your Attack Surface in 5 Ways

Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minimal as possible. Organizations must constantly monitor their attack surfaces to identify and… Continue Reading

What-is-a-Rootkit-and-How-to-Detect-it
December 24, 2021

What is a Rootkit and How to Detect It

A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can also infect the hardware and firmware of your… Continue Reading

October 21, 2021

Data Sales Are The Biggest Deep Web Threat In MEA Region

The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the MEA region are… Continue Reading

October 19, 2021

Countries More Affected by Cyber Attacks in September: China and Thailand

The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the APAC region are… Continue Reading

October 15, 2021

Ransomware Attacks on the Rise Around Europe

The Europe Regional Deep Web Report, which emerged with the research of the SOCRadar analyst team, is now available.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the European region… Continue Reading

October 11, 2021

Top Ransomware Group is LockBit 2.0 in the Americas

The Americas Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now avaible for the first time.  Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo