Blog

Latest articles from SOCRadar

Vulnerability-Round-Up-SOCRadars-Curation-of-Critical-Vulnerabilities-for-2021
December 27, 2021

Vulnerability Round-Up: SOCRadar’s Curation of Critical Vulnerabilities for 2021

Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vulnerabilities. Prioritization based on the value to the business and exposure to the attacks is… Continue Reading

December 22, 2021

Let’s Start From the Beginning: What is Encryption?

Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOCRadar's "101" articles on the subject of encryption. With the most concise definition, encryption… Continue Reading

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
December 21, 2021

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022

If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, then it needs a BYOD security policy.  What is BYOD? Initially, employees used only company-issued devices… Continue Reading

December 8, 2021

What are SMB Ports?

The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sharing are just a few of the network functions enabled by SMB.… Continue Reading

What-You-Need-to-Know-about-MSPs
December 3, 2021

What You Need to Know About MSPs

Managed service providers, abbreviated as MSPs, specialize in providing certain services to other companies. These services, called managed services, could be anything from IT services to transportation services. Key Partners in Digital Transformation By outsourcing… Continue Reading

November 18, 2021

How Private is Your VPN?

The term “Virtual Private Network” (VPN) refers to the ability to create a secure network connection while using public networks. VPNs encrypt your internet traffic and hide your true identity on the internet. Third parties… Continue Reading

November 12, 2021

How SOCRadar Can Help Fraud Teams?

Fraud refers to transactions made using card information without the knowledge of cardholders in the card payment sector in cybersecurity or purchases made by using fake or stolen credit cards. Today, with the advantages of… Continue Reading

November 11, 2021

A Rising Threat in Mobile: What is Banking Malware?

Mobile Banking malware is a malware family consisting of malicious apps and trojans designed to infect one’s system and collect financial data, personal information and potentially steal login credentials. Over %95 of mobile malware are… Continue Reading

November 9, 2021

What is Vulnerability Management?

The increasing number of vulnerabilities that security teams have to deal with makes it impossible to try to remediate all critical vulnerabilities. In fact, a small number of vulnerabilities pose a disproportionately large risk, however,… Continue Reading

May 31, 2021

Disrupt Attacker Infrastructure to Prevent Future Attacks with Takedown Service

Malware and phishing sites harm companies and organizations all over the world. Through removing sites and blocking attack infrastructures, takedown services strive to minimize the return on investment of the attackers so as to lessen… Continue Reading

January 18, 2021

The 8 Key Lessons From the SolarWinds Attacks

Nation-state threat actors breached the supply chain of SolarWinds to infiltrate its customers including U.S. government agencies and Fortune 500 companies. At least 18,000 organizations likely downloaded the malicious update, and thus suffered in the… Continue Reading

by
December 6, 2020

How Pandemic Affected Information Security

New work order: Remote workforce The COVID-19 virus, which emerged in the last months of 2019 and caused the announcement of a pandemic, led to a sudden change in daily norms for companies and employees,… Continue Reading

by
November 30, 2020

How To Detect and Prevent Business Email Compromise (BEC) Attacks?

What’s business email compromise and why is it dangerous? BEC is an attack in which an attacker gains access to a business email account and imitates the identity of the owner in order to defraud… Continue Reading

by
ransomware attacks
November 22, 2020

Top 5 Critical Vulnerabilities Behind Ransomware Attacks

Cybercriminals use encrypted ransomware that has become the most common type because it is difficult to crack the encryption and remove the malware. All the stuff you keep on your PC is encrypted by malicious… Continue Reading

by
fire and water fists
October 25, 2020

How To Takedown Phishing Domains for Free

Phishing - tricking people since "forever" Scammers have always existed, luring people into giving them their valuables or simply tricking them to achieve their goals. Before early technological inventions, you had to be more creative… Continue Reading

by
mobile shopping
October 18, 2020

Top Threat Intelligence Use Cases for the E-commerce Industry-II

Prevention of the landscape is no longer enough in today's cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases of… Continue Reading

by
Shopping online concept
October 12, 2020

Top Threat Intelligence Use Cases for the E-Commerce Industry-I

The prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases… Continue Reading

by
technical financial graph on technology abstract background
October 5, 2020

Top Threat Intelligence Use Cases for the Finance Sector-II

Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indiscriminate attacks, which is the price of simply being an online enterprise. At… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo