SOCRadar® Cyber Intelligence Inc. | Top 10 Threat Intelligence Podcasts
Apr 09, 2024
Top 10 Threat Intelligence Podcasts

Top 10 Threat Intelligence Podcasts Podcasts provide an easy and effective way to stay up to date on the threat intelligence landscape. They cover a wide range of topics, including insights into the m...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Risks During 2024 Indian General Elections
Apr 08, 2024
Cybersecurity Risks During 2024 Indian General Elections

Cybersecurity Risks During 2024 Indian General Elections General elections in India will be held from April 19 to June 1, 2024. In the context of election security in cyberspace, a couple of points ca...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Anatomy of Stealers: How Are They Stealing Our Information? Where Are They Taking It?
Apr 02, 2024
The Anatomy of Stealers: How Are They Stealing Our Information? Where ...

The Anatomy of Stealers: How Are They Stealing Our Information? Where Are They Taking It? The world of cyber security faces new and more complex threats every day. Among these threats, which we encoun...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Cybersecurity Books
Apr 01, 2024
Top 10 Cybersecurity Books

Top 10 Cybersecurity Books With new threats and challenges emerging every day within the cybersecurity field, to stay ahead of the curve, it’s necessary to keep learning. One of the best ways to do th...

Learn More
SOCRadar® Cyber Intelligence Inc. | Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists
Apr 01, 2024
Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists

Inevitable Tool in Pentesters’ Arsenal: Password Dictionary Lists Newbie penetration testers often struggle to grasp the significance of the initial findings reported by most Dynamic Application Scann...

Learn More
SOCRadar® Cyber Intelligence Inc. | CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security
Mar 26, 2024
CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security

CHAVECLOAK: A Complex Cyber Threat to Brazil’s Financial Security The Brazilian financial sector is facing a formidable cyber threat known as CHAVECLOAK, a banking trojan that has emerged as a signifi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Executive Interview: Mr. Miroslav on Mastering the Dynamic Cybersecurity Landscape
Mar 20, 2024
Executive Interview: Mr. Miroslav on Mastering the Dynamic Cybersecuri...

Executive Interview: Mr. Miroslav on Mastering the Dynamic Cybersecurity Landscape In the fast-paced and ever-evolving cybersecurity realm, staying ahead with the latest trends and technologies is cru...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Paste Sites Used by Threat Actors
Mar 11, 2024
Top 5 Paste Sites Used by Threat Actors

Top 5 Paste Sites Used by Threat Actors Paste sites are increasingly being utilized as hubs for disseminating code snippets, configuration files, and assorted textual data. While they offer valuable r...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Leverage Threat Intelligence in Incident Response
Mar 07, 2024
How to Leverage Threat Intelligence in Incident Response

How to Leverage Threat Intelligence in Incident Response In the ever-evolving landscape of cybersecurity threats, incident response has become a crucial component of any organization’s defense s...

Learn More
SOCRadar® Cyber Intelligence Inc. | Intelligence Pioneers: Meet the Top 10 CTI Experts
Mar 04, 2024
Intelligence Pioneers: Meet the Top 10 CTI Experts

Intelligence Pioneers: Meet the Top 10 CTI Experts The expertise of Cyber Threat Intelligence (CTI) professionals is essential in strengthening digital defenses against ever-evolving threats. Within t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring the Threat Landscape of Adversarial AI with MITRE ATLAS
Mar 01, 2024
Exploring the Threat Landscape of Adversarial AI with MITRE ATLAS

Exploring the Threat Landscape of Adversarial AI with MITRE ATLAS Navigating the complex landscape of cybersecurity threats requires constant vigilance, especially with the rise of Artificial Intellig...

Learn More
SOCRadar® Cyber Intelligence Inc. | DarkGate Malware: Exploring Threats and Countermeasures
Feb 29, 2024
DarkGate Malware: Exploring Threats and Countermeasures

DarkGate Malware: Exploring Threats and Countermeasures As we get increasingly digitized, the threat posed by malware has reached unprecedented levels in parallel. From individual users to large corpo...

Learn More
SOCRadar® Cyber Intelligence Inc. | How SOCRadar Helps You Improve Your CTEM Program
Feb 28, 2024
How SOCRadar Helps You Improve Your CTEM Program

How SOCRadar Helps You Improve Your CTEM Program Gartner published a report at the beginning of December 2022 and predicted how enterprises should implement a cybersecurity understanding for 2023 and ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using Jupyter Notebook for CTI using PyMISP
Feb 21, 2024
Using Jupyter Notebook for CTI using PyMISP

Using Jupyter Notebook for CTI using PyMISP In Cyber Threat Intelligence (CTI), Jupyter Notebook and PyMISP are transformative tools. Just as Bash commands empower defenders, these platforms offer dyn...

Learn More
SOCRadar® Cyber Intelligence Inc. | Power of AI: Dark Web Monitoring with ChatGPT
Feb 21, 2024
Power of AI: Dark Web Monitoring with ChatGPT

Power of AI: Dark Web Monitoring with ChatGPT The dark web, often shrouded in mystery and intrigue, is a part of the internet that remains hidden from conventional search engines and browsers. It̵...

Learn More
SOCRadar® Cyber Intelligence Inc. | Importance of Indicators of Compromise (IoCs) in CTI for Actionable Intelligence
Feb 19, 2024
Importance of Indicators of Compromise (IoCs) in CTI for Actionable In...

Importance of Indicators of Compromise (IoCs) in CTI for Actionable Intelligence Whether in the case of a targeted attack or random mass exploitation, using Indicators of Compromise (IoCs) is a crucia...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Linux Bash Commands that SOC Analysts Should Know
Feb 14, 2024
Top Linux Bash Commands that SOC Analysts Should Know

Top Linux Bash Commands that SOC Analysts Should Know Within the domain of Cyber Threat Intelligence (CTI), where various tools and processes are deployed for vigilant defense, Bash commands are one s...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway
Feb 08, 2024
How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway

How to Combat Fraud with Threat Intelligence: Cutting-Edge Pathway Organizations have increasingly moved significant portions of their operations online to streamline customer service processes. Inste...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using Threat Intelligence to Monitor Industry-Specific Threats
Feb 05, 2024
Using Threat Intelligence to Monitor Industry-Specific Threats

Using Threat Intelligence to Monitor Industry-Specific Threats Threat intelligence (TI) is essential to today’s cybersecurity practice because it enables organizations to gain insight into the motivat...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Can Open-Source LLMs Be Used in CTI?
Feb 02, 2024
How Can Open-Source LLMs Be Used in CTI?

How Can Open-Source LLMs Be Used in CTI? The adoption of Language Models (LLMs) has become prevalent in various applications, including Cyber Threat Intelligence (CTI). As one might anticipate, these ...

Learn More