SOCRadar® Cyber Intelligence Inc. | Fake Extortion: How to Tackle and How to Verify?
Jun 27, 2023
Fake Extortion: How to Tackle and How to Verify?

Fake Extortion: How to Tackle and How to Verify? Today, one of the most critical aspects of maintaining a respectable business is to have resistance against cyber attacks. To that aim, organizations t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring Cyber Threats During the Hajj Season
Jun 26, 2023
Exploring Cyber Threats During the Hajj Season

Exploring Cyber Threats During the Hajj Season “More than 2 million cyber attacks were recorded from all over the world within a month” That is the summary of the cyber struggle during the last Hajj s...

Learn More
SOCRadar® Cyber Intelligence Inc. | AWS S3 Bucket Takeover Vulnerability: Risks, Consequences, and Detection
Apr 25, 2023
AWS S3 Bucket Takeover Vulnerability: Risks, Consequences, and Detecti...

AWS S3 Bucket Takeover Vulnerability: Risks, Consequences, and Detection As the amount of data companies possesses grow, their costs can be optimized more efficiently. Thanks to the emergence of stora...

Learn More
SOCRadar® Cyber Intelligence Inc. | Customer Story: Bucket Half Empty? Half Full? Fully Public?
Feb 13, 2023
Customer Story: Bucket Half Empty? Half Full? Fully Public?

Customer Story: Bucket Half Empty? Half Full? Fully Public? In the days we live, security means not just physical security, especially in the business world. The protection of digital assets is now on...

Learn More
SOCRadar® Cyber Intelligence Inc. | Secure Your Cloud Environment: 5 Best Practices
Jan 03, 2023
Secure Your Cloud Environment: 5 Best Practices

Secure Your Cloud Environment: 5 Best Practices With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to...

Learn More
SOCRadar® Cyber Intelligence Inc. | Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report
Dec 26, 2022
Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoi...

Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report Gartner’s report with comprehensive analysis and insights for endpoint security has been published. ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022
Dec 15, 2022
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022

Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022 By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching ...

Learn More
SOCRadar® Cyber Intelligence Inc. | SOCRadar AttackMapper: Gartner-recommended EASM Solution
Nov 23, 2022
SOCRadar AttackMapper: Gartner-recommended EASM Solution

SOCRadar AttackMapper: Gartner-recommended EASM Solution The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity ma...

Learn More
SOCRadar® Cyber Intelligence Inc. | Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management
Nov 14, 2022
Penetration Testing vs. External Attack Surface Management vs. Vulnera...

Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks,...

Learn More
SOCRadar® Cyber Intelligence Inc. | A New Rising Social Engineering Trend: Callback Phishing
Nov 01, 2022
A New Rising Social Engineering Trend: Callback Phishing

A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cloud Security Module: Minimize Risk of Misconfigured Buckets
Oct 26, 2022
Cloud Security Module: Minimize Risk of Misconfigured Buckets

Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Detect Reconnaissance Using MITRE ATT&CK Framework
Aug 02, 2022
How to Detect Reconnaissance Using MITRE ATT&CK Framework

How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Free Attack Surface Management Tools
Jul 28, 2022
Top 5 Free Attack Surface Management Tools

Top 5 Free Attack Surface Management Tools Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization’s I...

Learn More
SOCRadar® Cyber Intelligence Inc. | Attack Surface Management (ASM) in 10 Questions
May 19, 2022
Attack Surface Management (ASM) in 10 Questions

Attack Surface Management (ASM) in 10 Questions The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Growing Attack Surfaces and Examples 
Apr 21, 2022
Growing Attack Surfaces and Examples 

Growing Attack Surfaces and Examples  Your organization’s attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Ultimate Guide to Brand Protection
Apr 20, 2022
The Ultimate Guide to Brand Protection

The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISOs Guide to External Attack Surface Management (EASM)
Mar 30, 2022
CISOs Guide to External Attack Surface Management (EASM)

CISOs Guide to External Attack Surface Management (EASM) The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomwar...

Learn More
SOCRadar® Cyber Intelligence Inc. | New Free Service from SOCRadar LABS: ‘External Attack Surface’
Jan 21, 2022
New Free Service from SOCRadar LABS: ‘External Attack Surface’

New Free Service from SOCRadar LABS: ‘External Attack Surface’ At SOCRadar LABS, we’re proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surfac...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Minimize Your Attack Surface in 5 Ways
Dec 27, 2021
How to Minimize Your Attack Surface in 5 Ways

How to Minimize Your Attack Surface in 5 Ways Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minima...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Rootkit and How to Detect It
Dec 24, 2021
What is a Rootkit and How to Detect It

What is a Rootkit and How to Detect It A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can a...

Learn More