SOCRadar® Cyber Intelligence Inc. | The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024
Aug 28, 2024
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2...

The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024 In 2024, ransomware will continue to rank as one of the most pervasive and effective threats to organizations globally. Attack...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Identify Spear Phishing Attacks
Aug 26, 2024
How to Identify Spear Phishing Attacks

How to Identify Spear Phishing Attacks Spear phishing remains one of the most effective tactics cybercriminals use to breach enterprise networks. These highly targeted attacks have only increased in r...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Dominant Role of Compromised Credentials in Data Breaches
Aug 25, 2024
The Dominant Role of Compromised Credentials in Data Breaches

The Dominant Role of Compromised Credentials in Data Breaches Compromised credentials are at the heart of modern cyber threats, driving a significant portion of data breaches across industries. Approx...

Learn More
SOCRadar® Cyber Intelligence Inc. | Secure the Credentials: How to Work With Breach Datasets
Aug 23, 2024
Secure the Credentials: How to Work With Breach Datasets

Secure the Credentials: How to Work With Breach Datasets Data breaches have become an increasingly common and devastating threat to businesses of all sizes. The need for proactive measures to secure y...

Learn More
SOCRadar® Cyber Intelligence Inc. | Best Threat Detection and Response (TDR) Practices
Aug 23, 2024
Best Threat Detection and Response (TDR) Practices

Best Threat Detection and Response (TDR) Practices The ability to detect and respond to threats swiftly is more critical than ever. Organizations must adopt a robust Threat Detection and Response (TDR...

Learn More
SOCRadar® Cyber Intelligence Inc. | Advanced Strategies for Effective Network Security Monitoring
Aug 22, 2024
Advanced Strategies for Effective Network Security Monitoring

Advanced Strategies for Effective Network Security Monitoring Network Security Monitoring (NSM) is critical for safeguarding an organization’s IT infrastructure against cyber threats. It involves coll...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is IOC Management?
Aug 21, 2024
What is IOC Management?

What is IOC Management? IOC Management is a critical aspect of cybersecurity that involves identifying, handling, and responding to data points indicating potential security breaches or malicious acti...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Pretexting? Definition and Examples in Cybersecurity
Aug 20, 2024
What is Pretexting? Definition and Examples in Cybersecurity

What is Pretexting? Definition and Examples in Cybersecurity Pretexting is a social engineering tactic in which attackers fabricate a scenario or a “pretext” to trick people into disclosin...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Supply Chain Intelligence Use Cases with SOCRadar Module
Aug 07, 2024
5 Supply Chain Intelligence Use Cases with SOCRadar Module

5 Supply Chain Intelligence Use Cases with SOCRadar Module Numerous high-profile incidents have evidenced that cyber threats to the supply chain can have catastrophic consequences. To mitigate these r...

Learn More
SOCRadar® Cyber Intelligence Inc. | Comprehensive Guide to Threat Vectors in Cybersecurity
Aug 02, 2024
Comprehensive Guide to Threat Vectors in Cybersecurity

Comprehensive Guide to Threat Vectors in Cybersecurity In today’s digital landscape, cybersecurity threats are ever-evolving and increasingly sophisticated. Threat vectors are the various methods or p...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat Intelligence Maturity Model (TIMM) - Utilizing TIP (Threat Intelligence Provider)
Jul 24, 2024
Threat Intelligence Maturity Model (TIMM) - Utilizing TIP (Threat Inte...

Threat Intelligence Maturity Model (TIMM) – Utilizing TIP (Threat Intelligence Provider) Many organizations lack sufficient knowledge about the threats they face and their own security posture as well...

Learn More
SOCRadar® Cyber Intelligence Inc. | Key Threat Intelligence Sources to Access Current Threat Insights
Jul 17, 2024
Key Threat Intelligence Sources to Access Current Threat Insights

Key Threat Intelligence Sources to Access Current Threat Insights Using various threat intelligence sources can make the difference between preventing an attack and falling victim to one. An AI illus...

Learn More
SOCRadar® Cyber Intelligence Inc. | Dark Web Profile: IntelBroker
Jun 28, 2024
Dark Web Profile: IntelBroker

Dark Web Profile: IntelBroker IntelBroker, a notorious figure known for orchestrating high-profile cyberattacks, operates within BreachForums. Specializing in identifying and selling access to comprom...

Learn More
SOCRadar® Cyber Intelligence Inc. | Tracking Down Notorious Ransomware Actors with CTI 2.0
Jun 24, 2024
Tracking Down Notorious Ransomware Actors with CTI 2.0

Tracking Down Notorious Ransomware Actors with CTI 2.0 Alex was talking to his security team when his boss called him into his office one day. News about ransomware attacks across the industry has bee...

Learn More
SOCRadar® Cyber Intelligence Inc. | Libraries for Red Teaming Your GenAI Applications
Jun 12, 2024
Libraries for Red Teaming Your GenAI Applications

Libraries for Red Teaming Your GenAI Applications It is critical to ensure the security and integrity of Generative AI (GenAI) applications. Red teaming these applications entails proactively identify...

Learn More
SOCRadar® Cyber Intelligence Inc. | Critical RCE Vulnerability (CVE-2024-4577) in PHP on Windows: Patch Now Available
Jun 08, 2024
Critical RCE Vulnerability (CVE-2024-4577) in PHP on Windows: Patch No...

Critical RCE Vulnerability (CVE-2024-4577) in PHP on Windows: Patch Now Available [Update] August 21, 2024: “CVE-2024-4577 Exploited to Deploy Msupedge Backdoor” [Update] June 13, 2024: “CISA Adds Cri...

Learn More
SOCRadar® Cyber Intelligence Inc. | Detecting Leaked Credentials with Identity & Access Intelligence
May 30, 2024
Detecting Leaked Credentials with Identity & Access Intelligence

Detecting Leaked Credentials with Identity & Access Intelligence Stealers are malicious software engineered by threat actors to compromise systems. Comparable to burglars, these trojans covertly e...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Integrate Vulnerability Intelligence Into SDLC Pipelines?
May 16, 2024
How to Integrate Vulnerability Intelligence Into SDLC Pipelines?

How to Integrate Vulnerability Intelligence Into SDLC Pipelines? The Software Development Lifecycle (SDLC) is a systematic process utilized by development teams to design, create, and deliver top-notc...

Learn More
SOCRadar® Cyber Intelligence Inc. | Cybersecurity Challenges for the European Parliament Election
May 10, 2024
Cybersecurity Challenges for the European Parliament Election

Cybersecurity Challenges for the European Parliament Election [Update] June 7, 2024: “Russian Threat Actors” Scheduled for the beginning of June 2024, the upcoming European Parliament elec...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISA Adds SOCRadar Labs to its Resources & Tools
Apr 05, 2024
CISA Adds SOCRadar Labs to its Resources & Tools

CISA Adds SOCRadar Labs to its Resources & Tools In a significant move to bolster cybersecurity resilience, the Cybersecurity and Infrastructure Security Agency (CISA) has officially included SOC...

Learn More