Top 10 RCE Vulnerabilities Exploited in 2023
Top 10 RCE Vulnerabilities Exploited in 2023 Cybersecurity unfolds in a continuous interplay between defenders and threat actors – an ever-evolving quest for software vulnerabilities, with both partie...
CISA KEV Timeframe Problems While Prioritizing Vulnerabilities
CISA KEV Timeframe Problems While Prioritizing Vulnerabilities The escalating number of vulnerabilities in the digital landscape demands a vigilant approach from the cybersecurity community. However, ...
Enhancing IoT Security with Cyber Threat Intelligence (CTI)
Enhancing IoT Security with Cyber Threat Intelligence (CTI) The Internet of Things (IoT) represents a significant technological advancement that is widely utilized in various aspects of our lives, inc...
Custom GPTs for Vulnerability Management: Harness the Power of AI in C...
Custom GPTs for Vulnerability Management: Harness the Power of AI in Cyber Defense Artificial intelligence (AI) stands as a multifaceted force, shaping the future of both defense and offense in the cy...
2023 Review of the CISA Known Exploited Vulnerabilities (KEV) Catalog
2023 Review of the CISA Known Exploited Vulnerabilities (KEV) Catalog Cybersecurity is a constant back-and-forth between the defenders and the threat actors, all centered around finding vulnerabilitie...
Predicting Vulnerability Exploitation for Proactive Cybersecurity: Wha...
Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It? Predicting outcomes closely before taking action is a fundamental aspect of effective decis...
Exploring the Top Vulnerabilities Exploited by State-Sponsored Threat ...
Exploring the Top Vulnerabilities Exploited by State-Sponsored Threat Actors While cyberattacks are a common concern for individuals and organizations alike, the shadowy realm of state-sponsored threa...
Counter-Ransomware Initiative: A United Front Against Ransomware
Counter-Ransomware Initiative: A United Front Against Ransomware [Update] November 9, 2023: Boeing was once again leaked on the victim site of the LockBit*** [Update] November 3, 2023: LockBit lists B...
Trick or Threat: Diving into Spooky Techniques of Ransomware Groups
Trick or Threat: Diving into Spooky Techniques of Ransomware Groups October, a month of chilling winds, pumpkin spice, and haunting tales, also marks Cybersecurity Awareness Month. An annual campaign,...
How to Utilize Attack Surface Management and Vulnerability Intelligenc...
How to Utilize Attack Surface Management and Vulnerability Intelligence for ‘Vulnerability Mapping’ The concept of vulnerability is a persistent shadow that haunts the digital realm; it is an element ...
Beyond the Click: Understanding Zero-Click Exploits and Their Impact
Beyond the Click: Understanding Zero-Click Exploits and Their Impact A zero-click exploit is a sophisticated type of cyberattack that operates without requiring any direct interaction from the target ...
How Are MSPs (Managed Service Providers) at Risk of Data Breaches?
How Are MSPs (Managed Service Providers) at Risk of Data Breaches? Have you ever wondered how your Managed Service Provider (MSP) is protecting both your data and its own? It is prudent to regularly a...
NIST Cybersecurity Framework 2.0: What You Need to Know
NIST Cybersecurity Framework 2.0: What You Need to Know In a previous SOCRadar blog post, we delved into the importance of cybersecurity frameworks for today’s organizations. In this installment, we p...
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medic...
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records In a regular threat and vulnerability hunting activity, SOCRadar has discovered during their research that thousands of...
Overview of TIBER-EU From Threat Intelligence Perspective
Overview of TIBER-EU From Threat Intelligence Perspective Financial institutions are crucial for the global economy. They hold trillions of dollars in assets and billions of customer records. As such,...
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...
Chain Reactions: Footprints of Major Supply Chain Attacks
Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs...
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...
Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with...
Navigating Cloud Vulnerabilities: Challenges and Solutions
Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resi...
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience In today’s rapidly evolving digital landscape, the term “cybersecurity” has become synonymous with safegu...