SOCRadar® Cyber Intelligence Inc. | Vulnerability Management Best Practices
Nov 09, 2022
Vulnerability Management Best Practices

Vulnerability Management Best Practices Every day, new vulnerabilities emerge, and multiplying proliferating vulnerabilities throughout today’s complex technology contexts yield a never-ending risk ha...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Should CISOs Prepare on the Current Cyberthreat Landscape?
Nov 08, 2022
How Should CISOs Prepare on the Current Cyberthreat Landscape?

How Should CISOs Prepare on the Current Cyberthreat Landscape? Recent research by John Sakellariadis for the Atlantic Council delves deeper into the emergence of ransomware over the past ten...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Critical Vulnerabilities Used by Ransomware Groups
Nov 07, 2022
Top Critical Vulnerabilities Used by Ransomware Groups

Top Critical Vulnerabilities Used by Ransomware Groups As ransomware attacks have grown in popularity recently, researchers have begun compiling an easy-to-follow list of vulnerabilities exploited by ...

Learn More
SOCRadar® Cyber Intelligence Inc. | A New Rising Social Engineering Trend: Callback Phishing
Nov 01, 2022
A New Rising Social Engineering Trend: Callback Phishing

A New Rising Social Engineering Trend: Callback Phishing Callback phishing emerged as a hybrid social engineering technique that combines phishing and vishing. The phishing technique used to steal sen...

Learn More
SOCRadar® Cyber Intelligence Inc. | MFA Bypass Techniques: How Does it Work?
Oct 31, 2022
MFA Bypass Techniques: How Does it Work?

MFA Bypass Techniques: How Does it Work? Identification and authentication are the first phase of verification in the login processes of Information Systems. Malicious threat actors use various method...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cloud Security Module: Minimize Risk of Misconfigured Buckets
Oct 26, 2022
Cloud Security Module: Minimize Risk of Misconfigured Buckets

Cloud Security Module: Minimize Risk of Misconfigured Buckets Not long ago, there were discussions about whether organizations should migrate to the cloud. The future has come, and almost all dig...

Learn More
SOCRadar® Cyber Intelligence Inc. | Better Protect Your Mobile App with SOCRadar MAS Module
Oct 18, 2022
Better Protect Your Mobile App with SOCRadar MAS Module

Better Protect Your Mobile App with SOCRadar MAS Module Threat actors use all kinds of methods to achieve their malicious goals. Mobile apps are among the most popular targets for attackers lately. Ta...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Data Loss Prevention (DLP)? [Ultimate Guide]
Oct 17, 2022
What is Data Loss Prevention (DLP)? [Ultimate Guide]

What is Data Loss Prevention (DLP)? [Ultimate Guide] Data loss prevention (DLP) prohibits users on a business network from transferring sensitive data outside of the network. DLP systems assist networ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Recent Attack Types Against Cloud Infrastructures
Sep 09, 2022
Recent Attack Types Against Cloud Infrastructures

Recent Attack Types Against Cloud Infrastructures ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How XDR Powers Rapid Attack Detection and Response
Sep 07, 2022
How XDR Powers Rapid Attack Detection and Response

How XDR Powers Rapid Attack Detection and Response A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends ca...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Account Takeover and How to Prevent It?
Sep 05, 2022
What is Account Takeover and How to Prevent It?

What is Account Takeover and How to Prevent It? ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Malvertising & How to Stop Ad Malware?
Sep 02, 2022
What is Malvertising & How to Stop Ad Malware?

What is Malvertising & How to Stop Ad Malware? ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Customer Identity and Access Management (CIAM)?
Sep 01, 2022
What is Customer Identity and Access Management (CIAM)?

What is Customer Identity and Access Management (CIAM)? CIAM (Customer identity and access management) is part of the identity and access management (IAM) system integrated into applications for exter...

Learn More
SOCRadar® Cyber Intelligence Inc. | 10 Free Security Testing Tools to Test Your Website  
Aug 30, 2022
10 Free Security Testing Tools to Test Your Website  

10 Free Security Testing Tools to Test Your Website   Security testing for an application is a crucial element in the lifecycle of software testing. It restricts unwanted intrusions at multiple applic...

Learn More
SOCRadar® Cyber Intelligence Inc. | All You Need to Know About Endpoint Security
Aug 29, 2022
All You Need to Know About Endpoint Security

All You Need to Know About Endpoint Security Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market’s compound annual growth rate...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 TLDs Threat Actors Use for Phishing
Aug 24, 2022
Top 10 TLDs Threat Actors Use for Phishing

Top 10 TLDs Threat Actors Use for Phishing [Update] May 18, 2023: Google has released eight new top-level domains (TLDs). Added the subheading: “Google’s New TLDs: Commercial Opportunities...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 DNS Threat Analysis and Monitoring Tools
Aug 08, 2022
Top 10 DNS Threat Analysis and Monitoring Tools

Top 10 DNS Threat Analysis and Monitoring Tools DNS converts easy-to-remember domain names into numeric IP addresses determined by the primary network protocols of the computer services and devices to...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Detect Reconnaissance Using MITRE ATT&CK Framework
Aug 02, 2022
How to Detect Reconnaissance Using MITRE ATT&CK Framework

How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...

Learn More
SOCRadar® Cyber Intelligence Inc. | Insider Threats Rising: Average Cost of an Incident is $6.6M
Aug 01, 2022
Insider Threats Rising: Average Cost of an Incident is $6.6M

Insider Threats Rising: Average Cost of an Incident is $6.6M The annual Cost of a Data Breach Report, featuring research by Ponemon Institute, offers insights from 550 actual breaches to help you unde...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Domain Hijacking and How to Prevent
Jul 26, 2022
What is Domain Hijacking and How to Prevent

What is Domain Hijacking and How to Prevent Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations....

Learn More