SOCRadar® Cyber Intelligence Inc. | How to Utilize Attack Surface Management and Vulnerability Intelligence for ‘Vulnerability Mapping’
Oct 30, 2023
How to Utilize Attack Surface Management and Vulnerability Intelligenc...

How to Utilize Attack Surface Management and Vulnerability Intelligence for ‘Vulnerability Mapping’ The concept of vulnerability is a persistent shadow that haunts the digital realm; it is an element ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Beyond the Click: Understanding Zero-Click Exploits and Their Impact
Oct 16, 2023
Beyond the Click: Understanding Zero-Click Exploits and Their Impact

Beyond the Click: Understanding Zero-Click Exploits and Their Impact A zero-click exploit is a sophisticated type of cyberattack that operates without requiring any direct interaction from the target ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Are MSPs (Managed Service Providers) at Risk of Data Breaches?
Oct 11, 2023
How Are MSPs (Managed Service Providers) at Risk of Data Breaches?

How Are MSPs (Managed Service Providers) at Risk of Data Breaches? Have you ever wondered how your Managed Service Provider (MSP) is protecting both your data and its own? It is prudent to regularly a...

Learn More
SOCRadar® Cyber Intelligence Inc. | NIST Cybersecurity Framework 2.0: What You Need to Know
Sep 26, 2023
NIST Cybersecurity Framework 2.0: What You Need to Know

NIST Cybersecurity Framework 2.0: What You Need to Know In a previous SOCRadar blog post, we delved into the importance of cybersecurity frameworks for today’s organizations. In this installment, we p...

Learn More
SOCRadar® Cyber Intelligence Inc. | Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records
Sep 22, 2023
Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medic...

Critical DICOM Server Misconfigurations Lead to Exposure of 1.6M Medical Records In a regular threat and vulnerability hunting activity, SOCRadar has discovered during their research that thousands of...

Learn More
SOCRadar® Cyber Intelligence Inc. | Overview of TIBER-EU From Threat Intelligence Perspective
Sep 14, 2023
Overview of TIBER-EU From Threat Intelligence Perspective

Overview of TIBER-EU From Threat Intelligence Perspective Financial institutions are crucial for the global economy. They hold trillions of dollars in assets and billions of customer records. As such,...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cyber Threat Intelligence (CTI) Roles for Ransomware Protection
Sep 04, 2023
Cyber Threat Intelligence (CTI) Roles for Ransomware Protection

Cyber Threat Intelligence (CTI) Roles for Ransomware Protection Ransomware attacks remain one of the most significant cyber threats against organizations today. Despite numerous countries launching co...

Learn More
SOCRadar® Cyber Intelligence Inc. | Chain Reactions: Footprints of Major Supply Chain Attacks
Aug 28, 2023
Chain Reactions: Footprints of Major Supply Chain Attacks

Chain Reactions: Footprints of Major Supply Chain Attacks In today’s interconnected digital ecosystem, supply chain attacks have emerged as one of the most potent threats. A supply chain attack occurs...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability Intelligence and CVERadar
Aug 25, 2023
Navigating the Cyber Threat Landscape with SOCRadar's Vulnerability In...

Navigating the Cyber Threat Landscape with SOCRadar’s Vulnerability Intelligence and CVERadar In the world of cybersecurity, vulnerability intelligence is like a guiding light for experts dealing with...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating Cloud Vulnerabilities: Challenges and Solutions
Aug 24, 2023
Navigating Cloud Vulnerabilities: Challenges and Solutions

Navigating Cloud Vulnerabilities: Challenges and Solutions The cloud, in its simplest form, is a system of servers that store data and applications over the internet rather than on a computer’s ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience
Aug 23, 2023
Exploring the NIST Cybersecurity Framework: Strengthening Digital Resi...

Exploring the NIST Cybersecurity Framework: Strengthening Digital Resilience In today’s rapidly evolving digital landscape, the term “cybersecurity” has become synonymous with safegu...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Software
Aug 17, 2023
The Wolf in Sheep's Clothing: How Cybercriminals Abuse Legitimate Soft...

The Wolf in Sheep’s Clothing: How Cybercriminals Abuse Legitimate Software [Update] November 9, 2023: Added FBI’s notice, see under the title: “FBI Warns of Ransomware Threats via Th...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat-Informed Defense (TID): A Threat Intelligence Perspective
Aug 04, 2023
Threat-Informed Defense (TID): A Threat Intelligence Perspective

Threat-Informed Defense (TID): A Threat Intelligence Perspective Cyberattacks are increasing in frequency worldwide, posing significant challenges for organizations as they strive to protect their cyb...

Learn More
SOCRadar® Cyber Intelligence Inc. | Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your System
Aug 03, 2023
Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your...

Living Off the Land (LOTL): The Invisible Cyber Threat Lurking in Your System [Update] January 10, 2024: “Countering Living Off the Land (LOTL) Attack Methods with AI and ML” ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Black Box of GitHub Leaks: Analyzing Companies' GitHub Repos
Jul 25, 2023
The Black Box of GitHub Leaks: Analyzing Companies' GitHub Repos

The Black Box of GitHub Leaks: Analyzing Companies’ GitHub Repos This research aimed to investigate the files that companies might have accidentally uploaded to GitHub and identify any sensitive...

Learn More
SOCRadar® Cyber Intelligence Inc. | A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses
Jul 24, 2023
A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses

A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses Figure 1: Top 25 CWE logo (MITRE) The 2023 CWE Top 25 Most Dangerous Software Weaknesses is a list that ranks the most widespread and c...

Learn More
SOCRadar® Cyber Intelligence Inc. | From Azure AD to Microsoft Entra ID: Navigating the Name Change and Strengthening Phishing Defense
Jul 17, 2023
From Azure AD to Microsoft Entra ID: Navigating the Name Change and St...

From Azure AD to Microsoft Entra ID: Navigating the Name Change and Strengthening Phishing Defense Azure AD, now known as Microsoft Entra ID, is undergoing a name change announced by Microsoft on 11 J...

Learn More
SOCRadar® Cyber Intelligence Inc. | OWASP Top 10 for LLMs: An Overview with SOCRadar
Jul 14, 2023
OWASP Top 10 for LLMs: An Overview with SOCRadar

OWASP Top 10 for LLMs: An Overview with SOCRadar Large Language Models (LLMs) are artificial intelligence models that generate human-like text. They have become increasingly prevalent in today’s...

Learn More
SOCRadar® Cyber Intelligence Inc. | Ransomware Attacks on Banking Industry
Jul 12, 2023
Ransomware Attacks on Banking Industry

Ransomware Attacks on Banking Industry Due to the escalating illicit pursuits of cybercriminals seeking unlawful financial gains, particular sectors and specific types of cyber attacks tend to gain pr...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Assets Discovery Journey with SOCRadar XTI EASM
Jul 11, 2023
Navigating the Assets Discovery Journey with SOCRadar XTI EASM

Navigating the Assets Discovery Journey with SOCRadar XTI EASM The attack surface is the sum of all potential entry points an attacker can use to gain unauthorized access to an organization’s as...

Learn More