SOCRadar® Cyber Intelligence Inc. | Top 10 Malware Analysis Platforms & Tools
Jul 13, 2023
Top 10 Malware Analysis Platforms & Tools

Top 10 Malware Analysis Platforms & Tools While cyberspace constantly expands, some dangers like malware come to the surface in parallel. A mail attachment, an innocent-looking application downloa...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Assets Discovery Journey with SOCRadar XTI EASM
Jul 11, 2023
Navigating the Assets Discovery Journey with SOCRadar XTI EASM

Navigating the Assets Discovery Journey with SOCRadar XTI EASM The attack surface is the sum of all potential entry points an attacker can use to gain unauthorized access to an organization’s as...

Learn More
SOCRadar® Cyber Intelligence Inc. | Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management
Jun 29, 2023
Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integratio...

Best of Both Worlds: CISA’s Known Exploited Vulnerabilities Integration with SOCRadar External Attack Surface Management In today’s digital landscape, the threat of cyberattacks looms large, with thre...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using OSINT to Strengthen Organizational Security
Jun 28, 2023
Using OSINT to Strengthen Organizational Security

Using OSINT to Strengthen Organizational Security Open-source intelligence or “OSINT” is collecting and analyzing data gathered from publicly available open sources (social media, news, dark web, etc....

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for SOC Analysts
May 30, 2023
ChatGPT for SOC Analysts

ChatGPT for SOC Analysts ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 million mo...

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for CTI Professionals
May 23, 2023
ChatGPT for CTI Professionals

ChatGPT for CTI Professionals In 1950, Alan Turing, the father of modern computing, asked, “Can machines think?” Over the years, that question has evolved into a quest for inventing machines that can ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Is Cyber Threat Intelligence?
Mar 30, 2023
What Is Cyber Threat Intelligence?

What Is Cyber Threat Intelligence? The swift adoption of information technology has coincided with an alarming surge in cyber-attacks, as malicious actors deploy increasingly sophisticated exploits. T...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Stealer as a Service?
Feb 01, 2023
What is Stealer as a Service?

What is Stealer as a Service? By SOCRadar Research Stealer as a service is a marketing approach in which threat actors offer to sell or lease access to information-stealer tools designed to steal...

Learn More
SOCRadar® Cyber Intelligence Inc. | <strong>From Zero to Adversary: APTs</strong>
Jan 23, 2023
From Zero to Adversary: APTs

From Zero to Adversary: APTs By SOCRadar Research From time to time, news hit the front pages regarding cyberattacks on significant infrastructures, such as nuclear facilities, or major companies, suc...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is the Role of Single Sign-On in Security Measures? – Part 2
Dec 02, 2022
What is the Role of Single Sign-On in Security Measures? – Part 2

What is the Role of Single Sign-On in Security Measures? – Part 2 By SOCRadar Research Read the previous article: What is the Role of Single Sign-On in Security Measures? – Part 1 Maintaining easy and...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is the Role of Single Sign-On in Security Measures? – Part 1
Dec 01, 2022
What is the Role of Single Sign-On in Security Measures? – Part 1

What is the Role of Single Sign-On in Security Measures? – Part 1 By SOCRadar Research Identity and Access Management (IAM) can be challenging in an enterprise environment. For users and administ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Building Cybersecurity Awareness for Organizations
Nov 29, 2022
Building Cybersecurity Awareness for Organizations

Building Cybersecurity Awareness for Organizations Cybersecurity has become a vital phenomenon for every institution today, but ensuring safety is a long process that includes different layers, and on...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Ultimate OSINT Handbook on Personal Information
Nov 10, 2022
The Ultimate OSINT Handbook on Personal Information

The Ultimate OSINT Handbook on Personal Information OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to...

Learn More
SOCRadar® Cyber Intelligence Inc. | Halloween Special: The Spookiest Cybersecurity Stories
Oct 31, 2022
Halloween Special: The Spookiest Cybersecurity Stories

Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notification wa...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Different Methods of Threat Detection?
Oct 14, 2022
What are the Different Methods of Threat Detection?

What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Ten Things Will Change Cybersecurity in 2023
Sep 23, 2022
Ten Things Will Change Cybersecurity in 2023

Ten Things Will Change Cybersecurity in 2023 Businesses come across more significant cybersecurity challenges as technology evolves. The digital environment and the attack surface are changing every s...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Threat Intelligence Resources to Follow
Sep 22, 2022
Top 10 Threat Intelligence Resources to Follow

Top 10 Threat Intelligence Resources to Follow Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Customer Identity and Access Management (CIAM)?
Sep 01, 2022
What is Customer Identity and Access Management (CIAM)?

What is Customer Identity and Access Management (CIAM)? CIAM (Customer identity and access management) is part of the identity and access management (IAM) system integrated into applications for exter...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Threat Intelligence Browser Extensions for SOC Analysts
Aug 18, 2022
Top 10 Threat Intelligence Browser Extensions for SOC Analysts

Top 10 Threat Intelligence Browser Extensions for SOC Analysts Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity special...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Strategic Cyber Intelligence and How to Use it
Aug 16, 2022
What is Strategic Cyber Intelligence and How to Use it

What is Strategic Cyber Intelligence and How to Use it As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes a...

Learn More