Latest articles from SOCRadar

May 13, 2021

How to detect if your IP addresses are being used in DHT Networks?

Peer-to-peer networks are still being used in many parts of the World to download music, software, or movies. In its heyday peer 2 peer traffic was driving a considerable chunk of internet traffic.  A 2018 estimate… Continue Reading

March 1, 2021

Shadow IT Explained: What Are the Risks and How Can You Mitigate Them?

A recent study from EMC suggests that data loss and downtime result in losses of $ 1.7 trillion each year.[1] Since shadow IT is an operation that is often carried out unwittingly, companies do not… Continue Reading

February 22, 2021

Your Third-Party Is Now Your Weakest Link. How To Guard It?

The news of the state-sponsored attacks last year on up to 18,000 customers of the SolarWinds is just worsening. The SolarWinds attacks were confirmed by the New York Times to have infiltrated, as was first… Continue Reading

December 21, 2020

All You Need To Know About Open Source Threat Intelligence Sharing Platform: MISP

Threat intelligence platforms (TIP) are critical security tools that use global security data to help proactively identify, mitigate, and remediate security threats. Every day there are unique and ever-changing challenges. Whilst security experts know that… Continue Reading


powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo