Latest articles from SOCRadar
As the amount of data companies possesses grow, their costs can be optimized more efficiently. Thanks to the emergence of storage technologies, such as AWS S3, that meet business and compliance requirements and their user-friendly… Continue Reading
In the days we live, security means not just physical security, especially in the business world. The protection of digital assets is now one of the priorities of every company, and reaching those assets without… Continue Reading
With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to store, process, and manage their data. Cloud computing is a model for delivering computing services… Continue Reading
Gartner's report with comprehensive analysis and insights for endpoint security has been published. The Hype Cycle for Endpoint Security report aims to give organizations a perspective on why they should invest in these cybersecurity solutions while… Continue Reading
By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching for a way to breach defenses and expose what is underneath. During the Covid-19… Continue Reading
The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity market, was published on October 19, 2022. SOCRadar is also recognized as a recommended EASM… Continue Reading
In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks, data breaches, digital frauds, and ransomware attacks continue unabated. And it becomes more challenging to secure cyberspace. To cope with… Continue Reading
Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sensitive data or transmit harmful packages via email and vishing, which applies phishing over the… Continue Reading
Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all digital assets -services, databases, IT resources, and apps- are now stored in the cloud. Of… Continue Reading
In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to detect cyberattacks using MITRE ATT&CK Framework, and how we can protect ourselves and… Continue Reading
Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization's IT infrastructure. What is Attack Surface Management? While similar in nature to asset discovery or asset management, frequently… Continue Reading
The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading
Your organization's attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. This might involve flaws in your organization's personnel, physical, network,… Continue Reading
As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter the domain to use legitimate advances produced by corporations to bolster their… Continue Reading
The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomware rose to a level affecting the lives of ordinary people directly, thanks to the… Continue Reading
At SOCRadar LABS, we're proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surface monitoring of applications is the continuous practice of looking for vulnerabilities and anomalies that could take… Continue Reading
Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minimal as possible. Organizations must constantly monitor their attack surfaces to identify and… Continue Reading
A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can also infect the hardware and firmware of your… Continue Reading
The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the MEA region are… Continue Reading
The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum mentions, compromised credentials, and data exposure findings in the APAC region are… Continue Reading