SOCRadar® Cyber Intelligence Inc. | Secure Your Cloud Environment: 5 Best Practices
Jan 03, 2023
Secure Your Cloud Environment: 5 Best Practices

Secure Your Cloud Environment: 5 Best Practices With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to store, pr...

Learn More
SOCRadar® Cyber Intelligence Inc. | Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report
Dec 26, 2022
Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoi...

Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report Gartner’s report with comprehensive analysis and insights for endpoint security has been published. ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022
Dec 15, 2022
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022

Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022 By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching ...

Learn More
SOCRadar® Cyber Intelligence Inc. | SOCRadar AttackMapper: Gartner-recommended EASM Solution
Nov 23, 2022
SOCRadar AttackMapper: Gartner-recommended EASM Solution

SOCRadar AttackMapper: Gartner-recommended EASM Solution The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity ma...

Learn More
SOCRadar® Cyber Intelligence Inc. | Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management
Nov 14, 2022
Penetration Testing vs. External Attack Surface Management vs. Vulnera...

Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks,...

Learn More
SOCRadar® Cyber Intelligence Inc. | A New Rising Social Engineering Trend: Callback Phishing
Nov 01, 2022
A New Rising Social Engineering Trend: Callback Phishing

A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cloud Security Module: Minimize Risk of Misconfigured Buckets
Oct 26, 2022
Cloud Security Module: Minimize Risk of Misconfigured Buckets

Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Detect Reconnaissance Using MITRE ATT&CK Framework
Aug 02, 2022
How to Detect Reconnaissance Using MITRE ATT&CK Framework

How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Free Attack Surface Management Tools
Jul 28, 2022
Top 5 Free Attack Surface Management Tools

Top 5 Free Attack Surface Management Tools Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization’s I...

Learn More
SOCRadar® Cyber Intelligence Inc. | Attack Surface Management (ASM) in 10 Questions
May 19, 2022
Attack Surface Management (ASM) in 10 Questions

Attack Surface Management (ASM) in 10 Questions The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Growing Attack Surfaces and Examples 
Apr 21, 2022
Growing Attack Surfaces and Examples 

Growing Attack Surfaces and Examples  Your organization’s attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Ultimate Guide to Brand Protection
Apr 20, 2022
The Ultimate Guide to Brand Protection

The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISOs Guide to External Attack Surface Management (EASM)
Mar 30, 2022
CISOs Guide to External Attack Surface Management (EASM)

CISOs Guide to External Attack Surface Management (EASM) The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomwar...

Learn More
SOCRadar® Cyber Intelligence Inc. | New Free Service from SOCRadar LABS: ‘External Attack Surface’
Jan 21, 2022
New Free Service from SOCRadar LABS: ‘External Attack Surface’

New Free Service from SOCRadar LABS: ‘External Attack Surface’ At SOCRadar LABS, we’re proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surfac...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Minimize Your Attack Surface in 5 Ways
Dec 27, 2021
How to Minimize Your Attack Surface in 5 Ways

How to Minimize Your Attack Surface in 5 Ways Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minima...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Rootkit and How to Detect It
Dec 24, 2021
What is a Rootkit and How to Detect It

What is a Rootkit and How to Detect It A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Data Sales Are The Biggest Deep Web Threat In MEA Region
Oct 21, 2021
Data Sales Are The Biggest Deep Web Threat In MEA Region

Data Sales Are The Biggest Deep Web Threat In MEA Region The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available.  Dark web incidents, hack...

Learn More
SOCRadar® Cyber Intelligence Inc. | Countries More Affected by Cyber Attacks in September: China and Thailand
Oct 19, 2021
Countries More Affected by Cyber Attacks in September: China and Thail...

Countries More Affected by Cyber Attacks in September: China and Thailand The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web inc...

Learn More
SOCRadar® Cyber Intelligence Inc. | Ransomware Attacks on the Rise Around Europe
Oct 15, 2021
Ransomware Attacks on the Rise Around Europe

Ransomware Attacks on the Rise Around Europe The Europe Regional Deep Web Report, which emerged with the research of the SOCRadar analyst team, is now available.  Dark web incidents, hacker forum...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Ransomware Group is LockBit 2.0 in the Americas
Oct 11, 2021
Top Ransomware Group is LockBit 2.0 in the Americas

Top Ransomware Group is LockBit 2.0 in the Americas The Americas Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now avaible for the first time.  Dark we...

Learn More