Blog

Latest articles from SOCRadar

Essential CTI Capabilities for Effective SOC Operations
October 17, 2023

Essential CTI Capabilities for Effective SOC Operations

In the dynamically evolving threat landscape of the digital age, organizations must thwart sophisticated cyber threats that jeopardize their operations, sensitive personal and commercial data, and reputations. To shield organizations from such threats, Security Operations… Continue Reading

Decrypting the Shadows: Revealing the Secrets of Ransomware Operators - An Interview with @htmalgae
October 2, 2023

Decrypting the Shadows: Revealing the Secrets of Ransomware Operators – An Interview with @htmalgae

Meet @htmalgae, an anonymous security researcher with a wealth of experience in web application development. In the digital realm, htmalgae operates under this unique handle, and in the physical world, he holds the role of… Continue Reading

September 29, 2023

Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Investments in Cyber Security

We are delighted to present an exclusive interview with Nigel Simpson, Head of Global Cybersecurity for International Data Group. With an inspiring career that reflects a deep commitment to safeguarding the digital world, Nigel brings… Continue Reading

Main Analytical Frameworks for Cyber Threat Intelligence
September 6, 2023

Main Analytical Frameworks for Cyber Threat Intelligence

Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Intelligence Platforms create intelligence information by gathering raw threat data and security-related information from multiple sources, both… Continue Reading

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks
August 21, 2023

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks

In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Information Security Officers (CISOs). Dark Web is a mysterious and often misunderstood part of the internet… Continue Reading

What is New in the MITRE ATT&CK Framework v12 and v13?
June 13, 2023

What is New in the MITRE ATT&CK Framework v12 and v13?

New threat actors are emerging on the dark web daily, and cybercrimes are increasing exponentially. According to some research insights, the cost of cybercrime is estimated to reach $8 trillion in 2023 and $10.5 trillion by 2025.… Continue Reading

Open-Source RATs Leveraged By APT Groups
June 13, 2023

Open-Source RATs Leveraged By APT Groups

The complexity and continuous evolution of cyber threats make the attack techniques developed by attackers with objectives such as information theft, espionage, or remote control of systems increasingly sophisticated. In this context, Advanced Persistent Threat (APT) attacks,… Continue Reading

ChatGPT for SOC Analysts
May 30, 2023

ChatGPT for SOC Analysts

ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 million monthly users, making it the… Continue Reading

Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy
May 26, 2023

Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy

In recent years, we have seen countless high-profile data breaches that have left businesses and individuals vulnerable. To combat these threats, there is one most effective security policy: Zero Trust (ZT). This powerful security concept is gaining traction… Continue Reading

ChatGPT for CTI Professionals
May 23, 2023

ChatGPT for CTI Professionals

In 1950, Alan Turing, the father of modern computing, asked, "Can machines think?" Over the years, that question has evolved into a quest for inventing machines that can understand and generate human-like text and has… Continue Reading

How to Detect & Prevent Ransomware Attacks [2022 CISO Edition]
April 26, 2023

How to Detect & Prevent Ransomware Attacks (2023 CISO Edition)

Why is Ransomware One of the First Items on the CISOs Agenda?  Rise with Pandemic With the pandemic, as we rush towards an increasingly digitized world, ransomware has become our institutions' most prevalent cyber threat. … Continue Reading

How Can Extended Threat Intelligence Help CISO's First 100 Days?
February 2, 2023

How Can Extended Threat Intelligence Help CISO’s First 100 Days?

When the expression "first 100 days" is mentioned, we all immediately think of what a leading politician has done from the first day to the hundredth day. These "first 100 days" became iconic during Franklin… Continue Reading

How Can SOC Analysts Benefit from Cyber Threat Intelligence?
November 15, 2022

How Can SOC Analysts Benefit from Cyber Threat Intelligence?

A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the provision of IT security services via detecting potential cyber threats and attacks actively,… Continue Reading

Valuable Resources and Must-Attend Conferences for CISOs
October 18, 2022

Valuable Resources and Must-Attend Conferences for CISOs

A senior-level executive known as a "CISO" is in charge of planning and executing an extensive information security program to safeguard the company from both internal and external threats. A CISO is a senior-level executive who carries… Continue Reading

What are the Different Methods of Threat Detection?
October 14, 2022

What are the Different Methods of Threat Detection?

Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise the network. Before a threat exploits any existing vulnerabilities, mitigating measures… Continue Reading

What Skills Do You Need to Become a Better CISO?
October 11, 2022

What Skills Do You Need to Become a Better CISO?

Chief information security officers (CISO) handle data protection and management's strategic, operational, and financial aspects. These experts collaborate closely with other leaders to design an enterprise or organization's information security policies and procedures. In addition,… Continue Reading

Top Cyber Threats Faced by the Aviation Industry
September 27, 2022

Top Cyber Threats Faced by the Aviation Industry

The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important critical infrastructures, with all its network, assets, and systems. It also interacts with… Continue Reading

Top 10 Free Cybersecurity Solutions for SMB
September 21, 2022

Top 10 Free Cybersecurity Solutions for SMB

Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just the largest companies, everyone must have effective solutions and a thorough cybersecurity strategy. Whether… Continue Reading

Recent Attack Types Against Cloud Infrastructures
September 9, 2022

Recent Attack Types Against Cloud Infrastructures

Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading

How XDR Powers Rapid Attack Detection and Response
September 7, 2022

How XDR Powers Rapid Attack Detection and Response

A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends can be expressed simply as follows; Increase in the on-demand ubiquitous data access &… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo