SOCRadar® Cyber Intelligence Inc. | OWASP Top 10 for LLMs: An Overview with SOCRadar
Jul 14, 2023
OWASP Top 10 for LLMs: An Overview with SOCRadar

OWASP Top 10 for LLMs: An Overview with SOCRadar Large Language Models (LLMs) are artificial intelligence models that generate human-like text. They have become increasingly prevalent in today’s...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Malware Analysis Platforms & Tools
Jul 13, 2023
Top 10 Malware Analysis Platforms & Tools

Top 10 Malware Analysis Platforms & Tools While cyberspace constantly expands, some dangers like malware come to the surface in parallel. A mail attachment, an innocent-looking application downloa...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Assets Discovery Journey with SOCRadar XTI EASM
Jul 11, 2023
Navigating the Assets Discovery Journey with SOCRadar XTI EASM

Navigating the Assets Discovery Journey with SOCRadar XTI EASM The attack surface is the sum of all potential entry points an attacker can use to gain unauthorized access to an organization’s as...

Learn More
SOCRadar® Cyber Intelligence Inc. | Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management
Jun 29, 2023
Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integratio...

Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management In today’s digital landscape, the threat of cyberattacks looms large, with thre...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using OSINT to Strengthen Organizational Security
Jun 28, 2023
Using OSINT to Strengthen Organizational Security

Using OSINT to Strengthen Organizational Security Open-source intelligence or “OSINT” is collecting and analyzing data gathered from publicly available open sources (social media, news, dark web, etc....

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for SOC Analysts
May 30, 2023
ChatGPT for SOC Analysts

ChatGPT for SOC Analysts ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 milli...

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for CTI Professionals
May 23, 2023
ChatGPT for CTI Professionals

ChatGPT for CTI Professionals In 1950, Alan Turing, the father of modern computing, asked, “Can machines think?” Over the years, that question has evolved into a quest for inventing machines that can ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Cyber Threat Intelligence? (2023 Edition)
Mar 30, 2023
What is Cyber Threat Intelligence? (2023 Edition)

What is Cyber Threat Intelligence? (2023 Edition) Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Stealer as a Service?
Feb 01, 2023
What is Stealer as a Service?

What is Stealer as a Service? By SOCRadar Research Stealer as a service is a marketing approach in which threat actors offer to sell or lease access to information-stealer tools designed to steal...

Learn More
SOCRadar® Cyber Intelligence Inc. | <strong>From Zero to Adversary: APTs</strong>
Jan 23, 2023
From Zero to Adversary: APTs

From Zero to Adversary: APTs By SOCRadar Research From time to time, news hit the front pages regarding cyberattacks on significant infrastructures, such as nuclear facilities, or major companies, suc...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is the Role of Single Sign-On in Security Measures? – Part 2
Dec 02, 2022
What is the Role of Single Sign-On in Security Measures? – Part 2

What is the Role of Single Sign-On in Security Measures? – Part 2 By SOCRadar Research Read the previous article: What is the Role of Single Sign-On in Security Measures? – Part 1 Maintaining easy and...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is the Role of Single Sign-On in Security Measures? – Part 1
Dec 01, 2022
What is the Role of Single Sign-On in Security Measures? – Part 1

What is the Role of Single Sign-On in Security Measures? – Part 1 By SOCRadar Research Identity and Access Management (IAM) can be challenging in an enterprise environment. For users and administ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Building Cybersecurity Awareness for Organizations
Nov 29, 2022
Building Cybersecurity Awareness for Organizations

Building Cybersecurity Awareness for Organizations by SOCRadar Research Cybersecurity has become a vital phenomenon for every institution today, but ensuring safety is a long process that includes dif...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Ultimate OSINT Handbook on Personal Information
Nov 10, 2022
The Ultimate OSINT Handbook on Personal Information

The Ultimate OSINT Handbook on Personal Information OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to...

Learn More
SOCRadar® Cyber Intelligence Inc. | Halloween Special: The Spookiest Cybersecurity Stories
Oct 31, 2022
Halloween Special: The Spookiest Cybersecurity Stories

Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notificat...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Different Methods of Threat Detection?
Oct 14, 2022
What are the Different Methods of Threat Detection?

What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Ten Things Will Change Cybersecurity in 2023
Sep 23, 2022
Ten Things Will Change Cybersecurity in 2023

Ten Things Will Change Cybersecurity in 2023 Businesses come across more significant cybersecurity challenges as technology evolves. The digital environment and the attack surface are changing every s...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Threat Intelligence Resources to Follow
Sep 22, 2022
Top 10 Threat Intelligence Resources to Follow

Top 10 Threat Intelligence Resources to Follow Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Customer Identity and Access Management (CIAM)?
Sep 01, 2022
What is Customer Identity and Access Management (CIAM)?

What is Customer Identity and Access Management (CIAM)? CIAM (Customer identity and access management) is part of the identity and access management (IAM) system integrated into applications for exter...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Threat Intelligence Browser Extensions for SOC Analysts
Aug 18, 2022
Top 10 Threat Intelligence Browser Extensions for SOC Analysts

Top 10 Threat Intelligence Browser Extensions for SOC Analysts Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity special...

Learn More