Blog

Latest articles from SOCRadar

What is the Role of Single Sign-On in Security Measures? – Part 2
December 2, 2022

What is the Role of Single Sign-On in Security Measures? – Part 2

By SOCRadar Research Read the previous article: What is the Role of Single Sign-On in Security Measures? – Part 1 Maintaining easy and secure Identity and Access Management in an enterprise environment is vital. The need might… Continue Reading

What is the Role of Single Sign-On in Security Measures? – Part 1
December 1, 2022

What is the Role of Single Sign-On in Security Measures? – Part 1

By SOCRadar Research Identity and Access Management (IAM) can be challenging in an enterprise environment. For users and administrators, there can be dozens of credentials to manage, leading to frustration and vital problems for the organization.… Continue Reading

Building Cybersecurity Awareness for Organizations
November 29, 2022

Building Cybersecurity Awareness for Organizations

by SOCRadar Research Cybersecurity has become a vital phenomenon for every institution today, but ensuring safety is a long process that includes different layers, and one of these layers is human. Since a crack at… Continue Reading

The Ultimate OSINT Handbook on Personal Information
November 10, 2022

The Ultimate OSINT Handbook on Personal Information

OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to newspapers, television, blogs, tweets, social media, photos, podcasts, and videos that… Continue Reading

October 31, 2022

Halloween Special: The Spookiest Cybersecurity Stories

It's the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notification warning them of data breaches than the spooky, ghostly visitations.   In the COVID-19… Continue Reading

What are the Different Methods of Threat Detection?
October 14, 2022

What are the Different Methods of Threat Detection?

Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise the network. Before a threat exploits any existing vulnerabilities, mitigating measures… Continue Reading

Ten Things Will Change Cybersecurity in 2023
September 23, 2022

Ten Things Will Change Cybersecurity in 2023

Businesses come across more significant cybersecurity challenges as technology evolves. The digital environment and the attack surface are changing every single day. Thus, the significance of knowing when to change priorities cannot be overstated. It… Continue Reading

Top 10 Threat Intelligence Resources to Follow
September 22, 2022

Top 10 Threat Intelligence Resources to Follow

Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there has been an explosion of prospective information sources providing incredible data.… Continue Reading

What is Customer Identity and Access Management (CIAM)?
September 1, 2022

What is Customer Identity and Access Management (CIAM)?

CIAM (Customer identity and access management) is part of the identity and access management (IAM) system integrated into applications for external users such as customers/consumers. The primary goal of CIAM is to manage and control… Continue Reading

Top 10 Threat Intelligence Browser Extensions for SOC Analysts
August 18, 2022

Top 10 Threat Intelligence Browser Extensions for SOC Analysts

Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity specialists.  It takes less time for security experts to research a website or online service,… Continue Reading

socradar blog cti
August 16, 2022

What is Strategic Cyber Intelligence and How to Use it

As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to… Continue Reading

Top 10 Search Engines for Pentesters and Bug Bounty Hunters
August 12, 2022

Top 10 Search Engines for Pentesters and Bug Bounty Hunters

Gathering information is the first step in identifying security vulnerabilities and analyzing risks. To collect data, security professionals use advanced and specific search engines. This article compiled the ten most used search engines by pentesters… Continue Reading

Top 10 DNS Threat Analysis and Monitoring Tools
August 8, 2022

Top 10 DNS Threat Analysis and Monitoring Tools

DNS converts easy-to-remember domain names into numeric IP addresses determined by the primary network protocols of the computer services and devices to be accessed. The DNS system, which can be considered a database, saves users… Continue Reading

Expectations of SOC Team from CTI
July 13, 2022

Expectations of SOC Team from CTI

Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A SOC team requires reliable cyber threat intelligence to… Continue Reading

July 8, 2022

Major Cyber Attacks in Review: June 2022

You can follow the major cyber security attacks of each month on SOCRadar's "Radar" page! We experienced critical days last month due to cyber-attacks in the developing and changing world. These attacks experienced by large and… Continue Reading

Top 5 Phishing Resources for SOC Teams
July 6, 2022

Top 5 Phishing Resources for SOC Teams

Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to well-crafted fake websites or malicious links using technics like social engineering. Passwords, financial information,… Continue Reading

Top 5 Tactics Threat Actors Use for Initial Access
July 5, 2022

Top 5 Tactics Threat Actors Use for Initial Access

A short while ago, combined security advice released by several national cybersecurity agencies highlighted the top ten attack vectors most used by threat actors to access networks. Threat actors take advantage of outdated systems, external… Continue Reading

How DNS Sinkholing Works?
May 25, 2022

How DNS Sinkholing Works?

What is a Domain Name System (DNS)?  The Domain Name System, or DNS, is a naming database that locates and translates internet domain names into IP addresses, similar to a phone’s contact list.  Web browsing… Continue Reading

What are the Top Ten Data Breaches of All Times?
May 6, 2022

What are the Top Ten Data Breaches of All Times?

In the cyber world that grows and develops with cumulative data accumulation, "small" and short-term data breaches that we think we can ignore from time to time may cause a crisis beyond our estimations. Unlike… Continue Reading

What are the Different Types of Attacks in Cybersecurity?
April 18, 2022

What are the Different Types of Attacks in Cybersecurity?

A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devices. Cyber attacks come in many flavors, each capable of attacking a specific computer… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo