Blog

Latest articles from SOCRadar

CEO Fraud: Investigating A Gift Card Scam
March 27, 2023

CEO Fraud: Investigating A Gift Card Scam

On March 8, 2023, SOCRadar announced that it received a $5 million Series A investment from 212, a leading equity fund investing in B2B technology start-ups. Then it has become the target of cyber fraudsters. As… Continue Reading

Top 10 Threat Intelligence Browser Extensions for SOC Analysts
August 18, 2022

Top 10 Threat Intelligence Browser Extensions for SOC Analysts

Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity specialists.  It takes less time for security experts to research a website or online service,… Continue Reading

Stop BEC Attacks with SOCRadar Takedown Processes
May 25, 2022

Stop BEC Attacks with SOCRadar Takedown Processes

Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious threat to organizations. The numbers in the "Phishing Activity Trends Reports" of the last quarter… Continue Reading

Step by Step Threat Hunting
March 9, 2022

Step by Step Threat Hunting

Threat hunting is a proactive approach for organizations to identify threats that have not been detected or remedied before. Considering that threat actors are carrying out more and more sophisticated attacks every day, the importance… Continue Reading

how to detect phishing
September 17, 2021

How to Detect Phishing Attacks?

1-What is a Phishing Attack? Phishing is a cyberattack that collects sensitive information such as login credentials, credit card numbers, bank account numbers, or other financial information by pretending to be a real website or… Continue Reading

cyberspace search engine
September 14, 2021

Top 5 Cyberspace Search Engines Used by Security Researchers

We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for information that is deeper than the capabilities of these search engines?… Continue Reading

how to detec bec attacks
September 2, 2021

How to Detect BEC Attacks?

1- What is a BEC attack? A Business Email Compromise (BEC) attack is a cyberattack involving the hijacking, spoofing, or impersonation of a business email address. The victim of a BEC attack receives an email… Continue Reading

domain hijacking
August 27, 2021

How to Detect Domain Hijacking Attacks?

What is a Domain Hijacking Attack? Domain Hijacking (Domain Name Theft), the control of a domain name, a domain name to be changed without the permission of the original owner of the registration or domain name… Continue Reading

April 12, 2021

The Ultimate List of Free and Open-source Threat Intelligence Feeds

Cybersecurity threats are evolving quickly, and there's no time to keep up to date on the new details for most security researchers. This is why threat intelligence is an important part of the security activities… Continue Reading

August 10, 2020

Top 10 Threat Intelligence Certifications: Empower Your Analysis Skills

Threat Intelligence plays a key role in providing the relevant intelligence for companies to help them carry out protective measures and keep their confidentiality. This makes it a promising career path for cyber security enthusiasts.… Continue Reading

by
May 29, 2020

10 GitHub Security Best Practices

GitHub is a standard when it comes to sharing code among developers. It is the most essential platform used by developers in every company, and despite the broad usage, there are still bad practices made… Continue Reading

by
May 20, 2020

10 Best Dark / Deep Web Browsers for Anonymity

The deep web is the underground of the whole web. Accessing it is not quite difficult, but you need to follow some basic steps in order to retain your privacy. We previously wrote a blog… Continue Reading

by
April 14, 2020

20 Free Cyber Security Solutions to Help You Through the COVID-19 Pandemic

With the current COVID-19 pandemic, remote working has become an inevitable option for many organizations. While enterprises have their own well-prepared IT teams, the pandemic has caught small organizations off guard in the security aspect.… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo