SOCRadar® Cyber Intelligence Inc. | CISA Adds SOCRadar Labs to its Resources & Tools
Apr 05, 2024
CISA Adds SOCRadar Labs to its Resources & Tools

CISA Adds SOCRadar Labs to its Resources & Tools In a significant move to bolster cybersecurity resilience, the Cybersecurity and Infrastructure Security Agency (CISA) has officially included SOC...

Learn More
SOCRadar® Cyber Intelligence Inc. | Major Cyber Attacks in Review: February 2024
Mar 15, 2024
Major Cyber Attacks in Review: February 2024

Major Cyber Attacks in Review: February 2024 February 2024 witnessed significant cyber attacks across industries like healthcare, energy, and cryptocurrency, highlighting the persistent threats organi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Paste Sites Used by Threat Actors
Mar 11, 2024
Top 5 Paste Sites Used by Threat Actors

Top 5 Paste Sites Used by Threat Actors Paste sites are increasingly being utilized as hubs for disseminating code snippets, configuration files, and assorted textual data. While they offer valuable r...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Leverage Threat Intelligence in Incident Response
Mar 07, 2024
How to Leverage Threat Intelligence in Incident Response

How to Leverage Threat Intelligence in Incident Response In the ever-evolving landscape of cybersecurity threats, incident response has become a crucial component of any organization’s defense s...

Learn More
SOCRadar® Cyber Intelligence Inc. | Securing the Chain: How Threat Intelligence Strengthens Third-Party Risk Management
Jan 26, 2024
Securing the Chain: How Threat Intelligence Strengthens Third-Party Ri...

Securing the Chain: How Threat Intelligence Strengthens Third-Party Risk Management Businesses increasingly face new cybersecurity incidents that are disruptive, costly, and can significantly damage t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Sensitive Information in APIs and Secure Usage of Postman
Jan 23, 2024
Sensitive Information in APIs and Secure Usage of Postman

Sensitive Information in APIs and Secure Usage of Postman One of the developers’ most frequently used tools in software development is undoubtedly Postman. But what exactly are API and Postman, and ho...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cyber Insurance in the Age of Ransomware: Protection or Provocation?
Jan 19, 2024
Cyber Insurance in the Age of Ransomware: Protection or Provocation?

Cyber Insurance in the Age of Ransomware: Protection or Provocation? Businesses are increasingly facing the threat of cybercrime, particularly ransomware. This malicious software locks users out of th...

Learn More
SOCRadar® Cyber Intelligence Inc. | Fact-Checking of Cyber Incidents and CTI as a Helper
Jan 11, 2024
Fact-Checking of Cyber Incidents and CTI as a Helper

Fact-Checking of Cyber Incidents and CTI as a Helper Nowadays, every article on information security starts with “In today’s rapidly evolving digital landscape,” but this time it is a really appropria...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cyber Siege: The Growing Threat to the US Healthcare
Jan 08, 2024
Cyber Siege: The Growing Threat to the US Healthcare

Cyber Siege: The Growing Threat to the US Healthcare Last week, the US healthcare sector faced a surge in cyber attacks, marking a troubling start to the year. This wave of incidents, from data breach...

Learn More
SOCRadar® Cyber Intelligence Inc. | 2023 Dark Web Trends in SOCRadar Year-End Report
Jan 04, 2024
2023 Dark Web Trends in SOCRadar Year-End Report

2023 Dark Web Trends in SOCRadar Year-End Report The cybersecurity landscape in 2023 underwent significant transformations, as evidenced by the SOCRadar 2023 End-of-Year Report. This comprehensive rep...

Learn More
SOCRadar® Cyber Intelligence Inc. | Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It?
Nov 17, 2023
Predicting Vulnerability Exploitation for Proactive Cybersecurity: Wha...

Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It? Predicting outcomes closely before taking action is a fundamental aspect of effective decis...

Learn More
SOCRadar® Cyber Intelligence Inc. | Essential CTI Capabilities for Effective SOC Operations
Oct 17, 2023
Essential CTI Capabilities for Effective SOC Operations

Essential CTI Capabilities for Effective SOC Operations In the dynamically evolving threat landscape of the digital age, organizations must thwart sophisticated cyber threats that jeopardize their ope...

Learn More
SOCRadar® Cyber Intelligence Inc. | Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA
Oct 06, 2023
Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CI...

Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA Security misconfigurations occur when systems or applications are not correctly set up, leaving them vulnerable to potential se...

Learn More
SOCRadar® Cyber Intelligence Inc. | Main Analytical Frameworks for Cyber Threat Intelligence
Sep 06, 2023
Main Analytical Frameworks for Cyber Threat Intelligence

Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023
Sep 04, 2023
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023 Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Role of Threat Intelligence in Anti-Fraud Efforts
Aug 28, 2023
The Role of Threat Intelligence in Anti-Fraud Efforts

The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Dark Web Search Engines
Aug 15, 2023
Top 5 Dark Web Search Engines

Top 5 Dark Web Search Engines Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In this blog post, we delve into Dark Web search engines. Hidden from the ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is EMOTET Malware and How to Protect Yourself
Aug 11, 2023
What is EMOTET Malware and How to Protect Yourself

What is EMOTET Malware and How to Protect Yourself According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attac...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat-Informed Defense (TID): A Threat Intelligence Perspective
Aug 04, 2023
Threat-Informed Defense (TID): A Threat Intelligence Perspective

Threat-Informed Defense (TID): A Threat Intelligence Perspective Cyberattacks are increasing in frequency worldwide, posing significant challenges for organizations as they strive to protect their cyb...

Learn More
SOCRadar® Cyber Intelligence Inc. | A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses
Jul 24, 2023
A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses

A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses Figure 1: Top 25 CWE logo (MITRE) The 2023 CWE Top 25 Most Dangerous Software Weaknesses is a list that ranks the most widespread and c...

Learn More