
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022
Top 5 Vulnerabilities Routinely Exploited by Threat Actors in 2022 By SOCRadar Research Day by day, it becomes harder to maintain a good security posture. Threat actors are at every corner, searching ...

Major Cyber Attacks in Review: November 2022
Major Cyber Attacks in Review: November 2022 Although the industry was relatively quiet last month, information is always valuable to both threat actors and us; in fact, it is vital. Helping you to pr...

How Can SOC Analysts Benefit from Cyber Threat Intelligence?
How Can SOC Analysts Benefit from Cyber Threat Intelligence? A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the prov...

Major Cyber Attacks in Review: October 2022
Major Cyber Attacks in Review: October 2022 Major cyberattacks of the last month include data leaks, security breaches, phishing attacks, and much more. Here are the top cyber incidents of October 202...

Major Cyber Attacks in Review: September 2022
Major Cyber Attacks in Review: September 2022 Threat actors did not sit idle throughout September. They messed with citizens of various governments, giant companies like Uber, and even the gaming indu...

Top Cyber Threats Faced in Fintech and Cryptocurrency Industries
Top Cyber Threats Faced in Fintech and Cryptocurrency Industries People are more inclined to move their financial assets to a digital environment due to the ongoing advancements in technology and ...

Top Cyber Threats Faced by the Aviation Industry
Top Cyber Threats Faced by the Aviation Industry The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important...

Top 10 Search Engines for Pentesters and Bug Bounty Hunters
Top 10 Search Engines for Pentesters and Bug Bounty Hunters Gathering information is the first step in identifying security vulnerabilities and analyzing risks. To collect data, security professionals...

What is Dark Web Monitoring?
What is Dark Web Monitoring? As the most extensive worldwide system that stores information on everything (and almost everyone), the Internet comprises three distinct layers: the visible, the deep, an...

Cyber Kill Chain Model in Cyber Threat Intelligence
Cyber Kill Chain Model in Cyber Threat Intelligence Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks i...

Top 10 Twitter Accounts to Follow for Threat Intelligence
Top 10 Twitter Accounts to Follow for Threat Intelligence Threat intelligence feeds on such a broad spectrum that sometimes you’d be surprised to hear where you can get relevant information. Oft...

What Do You Need To Know About Vulnerability Intelligence
What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...

Step by Step Threat Hunting
Step by Step Threat Hunting Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out...

How Can You Avoid Potential Attacks with SOCRadar Integrations?
How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...

What is the Diamond Model of Intrusion Analysis?
What is the Diamond Model of Intrusion Analysis? The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its v...

What is The Intelligence Cycle?
What is The Intelligence Cycle? The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is ref...

What Do You Need To Know About Cloud Web Application Firewall (WAF)
What Do You Need To Know About Cloud Web Application Firewall (WAF) A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and t...

The Ultimate List of Free and Open-source Threat Intelligence Feeds
The Ultimate List of Free and Open-source Threat Intelligence Feeds Cybersecurity threats are evolving quickly, and there’s no time to keep up to date on the new details for most security researchers....

The Week in Dark Web - 02 April 2021 - Data Sale Frenzy
The Week in Dark Web – 02 April 2021 – Data Sale Frenzy Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. SQL Injection to Hyundai Russia, Chin...

The Week in Dark Web - 26 March 2021 - Grand Theft Data
The Week in Dark Web – 26 March 2021 – Grand Theft Data Powered by DarkMirror™ This week’s edition covers the latest dark web news from the past week. Citrix access sale, personal data sal...