SOCRadar® Cyber Intelligence Inc. | Top 5 Tools for Phishing Domain Detection
Jul 25, 2022
Top 5 Tools for Phishing Domain Detection

Top 5 Tools for Phishing Domain Detection Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is BEC Attack and How to Prevent it?
Jul 21, 2022
What is BEC Attack and How to Prevent it?

What is BEC Attack and How to Prevent it? BEC attack is a type of social engineering attack that takes place over email and the attacker aims for financial gain. Often, attackers aim to trick employee...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Spoofing Attack and How to Prevent It?
Jul 20, 2022
What is Spoofing Attack and How to Prevent It?

What is Spoofing Attack and How to Prevent It? In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal m...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Build a Proactive Incident Response Plan?
Jul 19, 2022
How to Build a Proactive Incident Response Plan?

How to Build a Proactive Incident Response Plan? Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. De...

Learn More
SOCRadar® Cyber Intelligence Inc. | New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
May 16, 2022
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs? SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cyber Threats to NGOs Increase: Half of Organizations Targeted
May 04, 2022
Cyber Threats to NGOs Increase: Half of Organizations Targeted

Cyber Threats to NGOs Increase: Half of Organizations Targeted NGOs and humanitarian nonprofits depend on digital communication technologies and software to coordinate their missions worldwide. In par...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Tips for Social Media Security
May 02, 2022
5 Tips for Social Media Security

5 Tips for Social Media Security Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and iden...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Prevent Steganography Attacks
Apr 26, 2022
How to Prevent Steganography Attacks

How to Prevent Steganography Attacks Steganography is an antique soft craft concealing information in paintings or different art products. Most artists use this technique to hide their signatures and ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Ultimate Guide to Brand Protection
Apr 20, 2022
The Ultimate Guide to Brand Protection

The Ultimate Guide to Brand Protection As technology advances toward innovation, many firms seize the opportunity to thrive on the digital network. On the other side, even criminal entities enter...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Different Types of Attacks in Cybersecurity?
Apr 18, 2022
What are the Different Types of Attacks in Cybersecurity?

What are the Different Types of Attacks in Cybersecurity? A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devi...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need To Know About Cybersecurity in Power Grids
Apr 15, 2022
What Do You Need To Know About Cybersecurity in Power Grids

What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...

Learn More
SOCRadar® Cyber Intelligence Inc. | Danger Lurking in GitHub Repositories
Apr 06, 2022
Danger Lurking in GitHub Repositories

Danger Lurking in GitHub Repositories GitHub is a system that has become the world’s largest source code repository, used by %90 of Fortune 100 companies and 94 million developers for sever...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Things You Should Know About the Genesis Marketplace
Apr 01, 2022
5 Things You Should Know About the Genesis Marketplace

5 Things You Should Know About the Genesis Marketplace [April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genes...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Prevent Credential Stuffing Attacks?
Mar 08, 2022
How to Prevent Credential Stuffing Attacks?

How to Prevent Credential Stuffing Attacks? We continuously come across the news about recently uncovered credential data breaches but rarely hear about the direct results of any particular breach. Si...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Can You Avoid Potential Attacks with SOCRadar Integrations?
Feb 24, 2022
How Can You Avoid Potential Attacks with SOCRadar Integrations?

How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is a Smishing Attack?
Feb 02, 2022
What is a Smishing Attack?

What is a Smishing Attack? Smishing is a fraud in which thieves send an SMS to a victim posing as a bank or organization to acquire personal information. SMS (short for “short messaging services”) and...

Learn More
SOCRadar® Cyber Intelligence Inc. | Vulnerability Round-Up: SOCRadar's Curation of Critical Vulnerabilities for 2021
Dec 27, 2021
Vulnerability Round-Up: SOCRadar's Curation of Critical Vulnerabilitie...

Vulnerability Round-Up: SOCRadar’s Curation of Critical Vulnerabilities for 2021 Vulnerability management is not a sprint but a marathon. No matter how hard you try, you cannot patch all the vul...

Learn More
SOCRadar® Cyber Intelligence Inc. | Let's Start From the Beginning: What is Encryption?
Dec 22, 2021
Let's Start From the Beginning: What is Encryption?

Let’s Start From the Beginning: What is Encryption? Sometimes, explaining the concepts from the beginning can solve the confusion for everyone. Today, we wanted to realize this and continued SOC...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022
Dec 21, 2021
What is BYOD Policy?: Practices to Help Keep Your Network Secure in 20...

What is BYOD Policy?: Practices to Help Keep Your Network Secure in 2022 If one company allows employees to bring their own computing devices to the workplace like smartphones, tablets, or laptops, th...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are SMB Ports?
Dec 08, 2021
What are SMB Ports?

What are SMB Ports? The SMB (Server Message Block) protocol provides for “client-server communication,” allowing programs and services on networked computers to communicate. File, print, and device sh...

Learn More