Secure Your Cloud Environment: 5 Best Practices
Secure Your Cloud Environment: 5 Best Practices With the increasing adoption of cloud computing, cloud security has become a major concern for businesses that rely on cloud-based services to store, pr...
Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoi...
Gartner Recognizes SOCRadar as an EASM Vendor in Hype Cycle for Endpoint Security Report Gartner’s report with comprehensive analysis and insights for endpoint security has been published. ...
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022 By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching ...
SOCRadar AttackMapper: Gartner-recommended EASM Solution
SOCRadar AttackMapper: Gartner-recommended EASM Solution The Gartner Invest Analyst Insight report, which will guide the future investment plans of managers and decision-makers in the cybersecurity ma...
Penetration Testing vs. External Attack Surface Management vs. Vulnera...
Penetration Testing vs. External Attack Surface Management vs. Vulnerability Management In an environment where attack methods are diversified, threat actors are constantly improving, massive attacks,...
A New Rising Social Engineering Trend: Callback Phishing
A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...
Cloud Security Module: Minimize Risk of Misconfigured Buckets
Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...
How to Detect Reconnaissance Using MITRE ATT&CK Framework
How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...
Top 5 Free Attack Surface Management Tools
Top 5 Free Attack Surface Management Tools Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization’s I...
Attack Surface Management (ASM) in 10 Questions
Attack Surface Management (ASM) in 10 Questions The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface ...
Growing Attack Surfaces and Examples
Growing Attack Surfaces and Examples Your organization’s attack surface is the number of attack vectors that may be utilized to conduct a cyberattack or obtain unauthorized access to sensitive data. ...
The Ultimate Guide to Brand Protection
The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...
CISOs Guide to External Attack Surface Management (EASM)
CISOs Guide to External Attack Surface Management (EASM) The year 2021 was started and ended with two major cyber security incidents: SolarWinds Attack and Log4j vulnerabilities. In between, ransomwar...
New Free Service from SOCRadar LABS: ‘External Attack Surface’
New Free Service from SOCRadar LABS: ‘External Attack Surface’ At SOCRadar LABS, we’re proud to introduce a Free External Attack Surface service for cybersecurity professionals. External attack surfac...
How to Minimize Your Attack Surface in 5 Ways
How to Minimize Your Attack Surface in 5 Ways Reducing the attack surface is crucial for intelligent cybersecurity for businesses. An essential security measure is to keep the attack surface as minima...
What is a Rootkit and How to Detect It
What is a Rootkit and How to Detect It A rootkit is a software that allows hackers to gain access to and control a computer. Although most rootkits attack software and the operating system, some can a...
Data Sales Are The Biggest Deep Web Threat In MEA Region
Data Sales Are The Biggest Deep Web Threat In MEA Region The MEA Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hack...
Countries More Affected by Cyber Attacks in September: China and Thail...
Countries More Affected by Cyber Attacks in September: China and Thailand The APAC Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web inc...
Ransomware Attacks on the Rise Around Europe
Ransomware Attacks on the Rise Around Europe The Europe Regional Deep Web Report, which emerged with the research of the SOCRadar analyst team, is now available. Dark web incidents, hacker forum...
Top Ransomware Group is LockBit 2.0 in the Americas
Top Ransomware Group is LockBit 2.0 in the Americas The Americas Regional DeepWeb Report, which emerged with the research of the SOCRadar analyst team, is now avaible for the first time. Dark we...