Blog

Latest articles from SOCRadar

What is EMOTET Malware and How to Protect Yourself
March 22, 2022

What is EMOTET Malware and How to Protect Yourself

According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attacks many devices in every industry, including small-large businesses, individuals, non-profit organizations, governments,… Continue Reading

How Can Reinforce Your Brand Protection Against Cyber Threats
March 21, 2022

How Can Reinforce Your Brand Protection Against Cyber Threats?

The rapidity with which businesses have transitioned to a digital business environment has created new unique difficulties that they must confront to secure essential and sensitive corporate data. Companies must discover brand protection solutions to mitigate their growing exposure to cyber-related… Continue Reading

February 24, 2022

How Can You Avoid Potential Attacks with SOCRadar Integrations?

Today's blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API documents regarding the APIs provided by SOCRadar (used depending on licenses/packages) from this link.  SOCRadar,… Continue Reading

February 9, 2022

What is the Diamond Model of Intrusion Analysis?

The Diamond Model of Intrusion Analysis is predicated on the idea that every cyber attack results from an adversary using some capacity to attack its victim over infrastructure. The diamond's vertices that lend this model… Continue Reading

what-is-the-intelligence-cycle
January 31, 2022

What is The Intelligence Cycle?  

The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is referred to as intelligence cycle management. Planning and direction, collecting, processing, exploitation,… Continue Reading

January 27, 2022

What is Network Port?

Computers must have an IP address to communicate with each other. IP addresses are divided into ports, which means virtual buses. It means port. However, its equivalent in computer language is a bridge.  Thanks to… Continue Reading

What-is-Network-Port
January 19, 2022

What are CVSS Scores?

The Common Vulnerability Scoring System (also known as CVSS) assigns a number value (0-10) to the severity of a security vulnerability. CVSS scores are often used by security professionals as part of a vulnerability management… Continue Reading

What-is-a-Security-Operations-Center-SOC-Ultimate-Guide
January 17, 2022

What is a Security Operations Center (SOC)? (Ultimate Guide)

A Security Operation Center (SOC) is a centralized function inside an organization that uses people, processes, and technology to continually monitor and enhance an organization’s security posture while preventing, detecting, analyzing, and responding to cybersecurity… Continue Reading

January 12, 2022

How Does Cyber Security Support Business Intelligence?

The second guide that we have prepared for cyber security experts and administrators is about “business intelligence”. Cybercrime has catastrophic consequences in today's corporate environment, including revenue and profit loss, brand ruin, erosion of consumer… Continue Reading

Ultimate-Guide-Using-Artificial-intelligence-in-Cybersecurity
January 11, 2022

Using Artificial Intelligence in Cybersecurity (Ultimate Guide)

Welcome to the first of our ultimate guides on some topics related to cybersecurity: AI vs. cybersecurity. In these compilations, we will try to answer the questions that come to mind about some hot issues.… Continue Reading

What-Do-You-Need-To-Know-About-Cloud-Web-Application-Firewall-WAF
January 6, 2022

What Do You Need To Know About Cloud Web Application Firewall (WAF)

A cloud Web Application Firewall (WAF) is a security application running on the cloud that tracks the traffic between the user and the web servers to filter and block malicious packages traveling back and forth… Continue Reading

December 30, 2021

What is Cyber Threat Intelligence?

Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence. This information is used to predict, prevent, and identify cyber-threats attempting to… Continue Reading

December 23, 2021

What is Operational Cyber Threat Intelligence and How to Use It

Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to the success of these initiatives is access to up-to-date cyber threat intelligence.  This blog describes the… Continue Reading

December 9, 2021

What is Technical Cyber Threat Intelligence and How to Use It

As cyber threats become more sophisticated, many organizations pay more attention to their security programs. Organizations of all sizes build security teams to deploy network solutions and address threats.  A key component to the success… Continue Reading

Quick-Facts-on-the-Worlds-Top-infoStealer-Malware-Threats
November 29, 2021

Quick Facts on the World’s Top InfoStealer Malware Threats

An info stealer is a piece of malicious software (malware) that tries to steal your information. In most cases, this means stealing information that can make money for the cybercriminals. The standard form of info… Continue Reading

November 9, 2021

What is Vulnerability Management?

The increasing number of vulnerabilities that security teams have to deal with makes it impossible to try to remediate all critical vulnerabilities. In fact, a small number of vulnerabilities pose a disproportionately large risk, however,… Continue Reading

November 8, 2021

How Can OSINT Tools be Used and What is External Attack Surface Management?

SOCRadar defines itself as a platform providing an early warning system with extended threat intelligence. In other words, SOCRadar protects companies and start-ups by providing critical cyber intelligence about their digital assets and vulnerabilities. External… Continue Reading

October 28, 2021

What is Operational Cyber Threat Intelligence?

As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to… Continue Reading

tactical cyber threat intelligence
September 21, 2021

What is Tactical Cyber Threat Intelligence and How to Use it

As cyber threats become more complex than ever, many organizations devote more resources to their security programs. Almost every organization creates security teams to deploy network solutions and address threats. A vital component of the… Continue Reading

domain hijacking
August 23, 2021

Detecting IoT Devices For Your Company

From smart wearables to interconnected industrial devices the IOT is becoming a larger part of our lives since the first coinage of the term in 1999 at a P&G presentation (although the idea goes far… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo