What is Dark Web Monitoring?
What is Dark Web Monitoring? As the most extensive worldwide system that stores information on everything (and almost everyone), the Internet comprises three distinct layers: the visible, the deep, an...
Cyber Kill Chain Model in Cyber Threat Intelligence
Cyber Kill Chain Model in Cyber Threat Intelligence Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks i...
Top 10 Twitter Accounts to Follow for Threat Intelligence
Top 10 Twitter Accounts to Follow for Threat Intelligence Threat intelligence feeds on such a broad spectrum that sometimes you’d be surprised to hear where you can get relevant information. Oft...
What Do You Need To Know About Vulnerability Intelligence
What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...
Step by Step Threat Hunting
Step by Step Threat Hunting Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out...
How Can You Avoid Potential Attacks with SOCRadar Integrations?
How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...
What is the Diamond Model of Intrusion Analysis?
What is the Diamond Model of Intrusion Analysis? The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its v...
What is The Intelligence Cycle?
What is The Intelligence Cycle? The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is ref...
What Do You Need To Know About Cloud Web Application Firewall (WAF)
What Do You Need To Know About Cloud Web Application Firewall (WAF) A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and t...
The Ultimate List of Free and Open-source Threat Intelligence Feeds
The Ultimate List of Free and Open-source Threat Intelligence Feeds Cybersecurity threats are evolving quickly, and there’s no time to keep up to date on the new details for most security researchers....
The Week in Dark Web - 02 April 2021 - Data Sale Frenzy
The Week in Dark Web – 02 April 2021 – Data Sale Frenzy Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. SQL Injection to Hyundai Russia, Chin...
The Week in Dark Web - 26 March 2021 - Grand Theft Data
The Week in Dark Web – 26 March 2021 – Grand Theft Data Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Citrix access sale, personal data sal...
The Week in Dark Web - 19 March 2021 - US Law Firms On Target
The Week in Dark Web – 19 March 2021 – US Law Firms On Target Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Unauthorized network access sal...
The Week in Dark Web - 12 March 2021 - Zero-Day Exploits and Then Some
The Week in Dark Web – 12 March 2021 – Zero-Day Exploits and Then Some Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Database sale of...
The Week in Dark Web - 05 March 2021 - Paypal & Fortune 500 Company Ac...
The Week in Dark Web – 05 March 2021 – Paypal & Fortune 500 Company Access Leaked Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. ...
The Week in Dark Web - 26 February 2021 - 37M LinkedIn User Data Leake...
The Week in Dark Web – 26 February 2021 – 37M LinkedIn User Data Leaked Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Linkedin user d...
The Week in Dark Web - 19 February 2021 - RDP Credential Sales on the ...
The Week in Dark Web – 19 February 2021 – RDP Credential Sales on the Rise Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week, including ma...
What You Need to Know About STIX and TAXII?
What You Need to Know About STIX and TAXII? STIX and TAXII were developed to improve cyber threat detection and mitigation. STIX stipulates the details of the threat, while TAXII decides the flow of i...
CTI is So Critical to SOC Teams for DNS Security
CTI is So Critical to SOC Teams for DNS Security Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per ...
Top 5 Remote Code Execution (RCE) Attacks in 2020
Top 5 Remote Code Execution (RCE) Attacks in 2020 According to a recent report[1], more than half of the email service on the Internet were impacted by remote code execution attacks. RCE vulnerabiliti...