SOCRadar® Cyber Intelligence Inc. | Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It?
Nov 17, 2023
Predicting Vulnerability Exploitation for Proactive Cybersecurity: Wha...

Predicting Vulnerability Exploitation for Proactive Cybersecurity: What’s EPSS, and How Can SVRS Enhance It? Predicting outcomes closely before taking action is a fundamental aspect of effective decis...

Learn More
SOCRadar® Cyber Intelligence Inc. | Essential CTI Capabilities for Effective SOC Operations
Oct 17, 2023
Essential CTI Capabilities for Effective SOC Operations

Essential CTI Capabilities for Effective SOC Operations In the dynamically evolving threat landscape of the digital age, organizations must thwart sophisticated cyber threats that jeopardize their ope...

Learn More
SOCRadar® Cyber Intelligence Inc. | Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA
Oct 06, 2023
Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CI...

Breaking Down the Top 10 Cybersecurity Misconfigurations by NSA and CISA Security misconfigurations occur when systems or applications are not correctly set up, leaving them vulnerable to potential se...

Learn More
SOCRadar® Cyber Intelligence Inc. | Main Analytical Frameworks for Cyber Threat Intelligence
Sep 06, 2023
Main Analytical Frameworks for Cyber Threat Intelligence

Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023
Sep 04, 2023
Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023

Top 10 Best Free Cyber Threat Intelligence Sources and Tools in 2023 Keeping abreast of cybersecurity developments has become a challenge, given the constantly evolving landscape. This includes newly ...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Role of Threat Intelligence in Anti-Fraud Efforts
Aug 28, 2023
The Role of Threat Intelligence in Anti-Fraud Efforts

The Role of Threat Intelligence in Anti-Fraud Efforts In an age where our lives are seamlessly intertwined with the digital realm, tales of unexpected encounters with scammers have become all too fami...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Dark Web Search Engines
Aug 15, 2023
Top 5 Dark Web Search Engines

Top 5 Dark Web Search Engines Shadowy depths of the internet, where anonymity reigns, and curiosity intertwines with caution. In this blog post, we delve into Dark Web search engines. Hidden from the ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is EMOTET Malware and How to Protect Yourself
Aug 11, 2023
What is EMOTET Malware and How to Protect Yourself

What is EMOTET Malware and How to Protect Yourself According to Arne Schoenbohm, who leads the German Federal Office of Information Security (BSI), EMOTET is the king of malware. EMOTET actively attac...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat-Informed Defense (TID): A Threat Intelligence Perspective
Aug 04, 2023
Threat-Informed Defense (TID): A Threat Intelligence Perspective

Threat-Informed Defense (TID): A Threat Intelligence Perspective Cyberattacks are increasing in frequency worldwide, posing significant challenges for organizations as they strive to protect their cyb...

Learn More
SOCRadar® Cyber Intelligence Inc. | A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses
Jul 24, 2023
A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses

A Snapshot of 2023 CWE Top 25 Most Dangerous Software Weaknesses Figure 1: Top 25 CWE logo (MITRE) The 2023 CWE Top 25 Most Dangerous Software Weaknesses is a list that ranks the most widespread and c...

Learn More
SOCRadar® Cyber Intelligence Inc. | The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabilities with SOCRadar
Jul 14, 2023
The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabil...

The added OWASP Top 10 for LLMs: An Overview of Critical AI Vulnerabilities with SOCRadar Large Language Models (LLMs) are artificial intelligence models that generate human-like text. They have becom...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Malware Analysis Platforms & Tools
Jul 13, 2023
Top 10 Malware Analysis Platforms & Tools

Top 10 Malware Analysis Platforms & Tools While cyberspace constantly expands, some dangers like malware come to the surface in parallel. A mail attachment, an innocent-looking application downloa...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Assets Discovery Journey with SOCRadar XTI EASM
Jul 11, 2023
Navigating the Assets Discovery Journey with SOCRadar XTI EASM

Navigating the Assets Discovery Journey with SOCRadar XTI EASM The attack surface is the sum of all potential entry points an attacker can use to gain unauthorized access to an organization’s as...

Learn More
SOCRadar® Cyber Intelligence Inc. | Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management
Jun 29, 2023
Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integratio...

Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management In today’s digital landscape, the threat of cyberattacks looms large, with thre...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using OSINT to Strengthen Organizational Security
Jun 28, 2023
Using OSINT to Strengthen Organizational Security

Using OSINT to Strengthen Organizational Security Open-source intelligence or “OSINT” is collecting and analyzing data gathered from publicly available open sources (social media, news, dark web, etc....

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for SOC Analysts
May 30, 2023
ChatGPT for SOC Analysts

ChatGPT for SOC Analysts ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 million mo...

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for CTI Professionals
May 23, 2023
ChatGPT for CTI Professionals

ChatGPT for CTI Professionals In 1950, Alan Turing, the father of modern computing, asked, “Can machines think?” Over the years, that question has evolved into a quest for inventing machines that can ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Cyber Threat Intelligence? (2023 Edition)
Mar 30, 2023
What is Cyber Threat Intelligence? (2023 Edition)

What is Cyber Threat Intelligence? (2023 Edition) Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Stealer as a Service?
Feb 01, 2023
What is Stealer as a Service?

What is Stealer as a Service? By SOCRadar Research Stealer as a service is a marketing approach in which threat actors offer to sell or lease access to information-stealer tools designed to steal...

Learn More
SOCRadar® Cyber Intelligence Inc. | <strong>From Zero to Adversary: APTs</strong>
Jan 23, 2023
From Zero to Adversary: APTs

From Zero to Adversary: APTs By SOCRadar Research From time to time, news hit the front pages regarding cyberattacks on significant infrastructures, such as nuclear facilities, or major companies, suc...

Learn More