Blog

Latest articles from SOCRadar

Top Cyber Threats Faced by the Aviation Industry
September 27, 2022

Top Cyber Threats Faced by the Aviation Industry

The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important critical infrastructures, with all its network, assets, and systems. It also interacts with… Continue Reading

Top 10 Search Engines for Pentesters and Bug Bounty Hunters
August 12, 2022

Top 10 Search Engines for Pentesters and Bug Bounty Hunters

Gathering information is the first step in identifying security vulnerabilities and analyzing risks. To collect data, security professionals use advanced and specific search engines. This article compiled the ten most used search engines by pentesters… Continue Reading

July 14, 2022

What is Dark Web Monitoring?

As the most extensive worldwide system that stores information on everything (and almost everyone), the Internet comprises three distinct layers: the visible, the deep, and the dark web. Some layers contain significantly more information than… Continue Reading

Cyber Kill Chain Model in Cyber Threat Intelligence
July 14, 2022

Cyber Kill Chain Model in Cyber Threat Intelligence

Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks is very important. However, how can it be possible to reach the maximum potential of… Continue Reading

Top 10 Twitter Accounts to Follow for Threat Intelligence
May 18, 2022

Top 10 Twitter Accounts to Follow for Threat Intelligence

Threat intelligence feeds on such a broad spectrum that sometimes you'd be surprised to hear where you can get relevant information. Often, it can be nearly impossible to keep track of everything because of the… Continue Reading

What Do You Need To Know About Vulnerability Intelligence
March 17, 2022

What Do You Need To Know About Vulnerability Intelligence

A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading

Step by Step Threat Hunting
March 9, 2022

Step by Step Threat Hunting

Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out more and more sophisticated attacks every day, the importance… Continue Reading

February 24, 2022

How Can You Avoid Potential Attacks with SOCRadar Integrations?

Today's blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API documents regarding the APIs provided by SOCRadar (used depending on licenses/packages) from this link.  SOCRadar,… Continue Reading

February 9, 2022

What is the Diamond Model of Intrusion Analysis?

The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its victim over infrastructure. The diamond's vertices that lend this model… Continue Reading

what-is-the-intelligence-cycle
January 31, 2022

What is The Intelligence Cycle?  

The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is referred to as intelligence cycle management. Planning and direction, collecting, processing, exploitation,… Continue Reading

What-Do-You-Need-To-Know-About-Cloud-Web-Application-Firewall-WAF
January 6, 2022

What Do You Need To Know About Cloud Web Application Firewall (WAF)

A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and the web servers to filter and block malicious packages traveling back and forth… Continue Reading

April 12, 2021

The Ultimate List of Free and Open-source Threat Intelligence Feeds

Cybersecurity threats are evolving quickly, and there's no time to keep up to date on the new details for most security researchers. This is why threat intelligence is an important part of the security activities… Continue Reading

April 2, 2021

The Week in Dark Web – 02 April 2021 – Data Sale Frenzy

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. SQL Injection to Hyundai Russia, Chinese mobile app data breach, LinkedIn 100M personal data sale, 300GB of personal details… Continue Reading

March 26, 2021

The Week in Dark Web – 26 March 2021 – Grand Theft Data

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Citrix access sale, personal data sale from various organizations in tech, education, sourcing, and intrusion detection system sale for… Continue Reading

March 19, 2021

The Week in Dark Web – 19 March 2021 – US Law Firms On Target

Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Unauthorized network access sale for Tata Communication and law firms from the US, Binance API keys database leaked, customer… Continue Reading

March 12, 2021

The Week in Dark Web – 12 March 2021 – Zero-Day Exploits and Then Some

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Database sale of an Israeli company, 2M Indonesian citizens PII data leak, Cobalt Strike new edition on sale are… Continue Reading

by
March 5, 2021

The Week in Dark Web – 05 March 2021 – Paypal & Fortune 500 Company Access Leaked

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Paypal user credentials leak, Fortune 500 company network access sale, ransomware attacks on various companies from different backgrounds like… Continue Reading

by
February 26, 2021

The Week in Dark Web – 26 February 2021 – 37M LinkedIn User Data Leaked

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week. Linkedin user data leak, RDP credential sales, ransomware attacks on worldwide companies and government institutions were among them Here… Continue Reading

by
February 19, 2021

The Week in Dark Web – 19 February 2021 – RDP Credential Sales on the Rise

Powered by DarkMirror™ This week's edition covers the latest dark web news from the past week, including major RDP credential sales, ransomware attacks on global corporations, and even some government organizations. Here is the breakdown… Continue Reading

by
February 15, 2021

What You Need to Know About STIX and TAXII?

STIX and TAXII were developed to improve cyber threat detection and mitigation. STIX stipulates the details of the threat, while TAXII decides the flow of information. STIX and TAXII are machine-readable and thus conveniently automated,… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo