Blog

Latest articles from SOCRadar

How Can Extended Threat Intelligence Help CISO's First 100 Days?
February 2, 2023

How Can Extended Threat Intelligence Help CISO’s First 100 Days?

When the expression "first 100 days" is mentioned, we all immediately think of what a leading politician has done from the first day to the hundredth day. These "first 100 days" became iconic during Franklin… Continue Reading

How Can SOC Analysts Benefit from Cyber Threat Intelligence?
November 15, 2022

How Can SOC Analysts Benefit from Cyber Threat Intelligence?

A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the provision of IT security services via detecting potential cyber threats and attacks actively,… Continue Reading

Valuable Resources and Must-Attend Conferences for CISOs
October 18, 2022

Valuable Resources and Must-Attend Conferences for CISOs

A senior-level executive known as a "CISO" is in charge of planning and executing an extensive information security program to safeguard the company from both internal and external threats. A CISO is a senior-level executive who carries… Continue Reading

What are the Different Methods of Threat Detection?
October 14, 2022

What are the Different Methods of Threat Detection?

Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise the network. Before a threat exploits any existing vulnerabilities, mitigating measures… Continue Reading

What Skills Do You Need to Become a Better CISO?
October 11, 2022

What Skills Do You Need to Become a Better CISO?

Chief information security officers (CISO) handle data protection and management's strategic, operational, and financial aspects. These experts collaborate closely with other leaders to design an enterprise or organization's information security policies and procedures. In addition,… Continue Reading

Top Cyber Threats Faced by the Aviation Industry
September 27, 2022

Top Cyber Threats Faced by the Aviation Industry

The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important critical infrastructures, with all its network, assets, and systems. It also interacts with… Continue Reading

How to Detect & Prevent Ransomware Attacks [2022 CISO Edition]
September 26, 2022

How to Detect & Prevent Ransomware Attacks (2022 CISO Edition)

Why is Ransomware One of the First Items on the CISOs Agenda?  Rise with Pandemic With the pandemic, as we rush towards an increasingly digitized world, ransomware has become our institutions' most prevalent cyber threat. … Continue Reading

Top 10 Free Cybersecurity Solutions for SMB
September 21, 2022

Top 10 Free Cybersecurity Solutions for SMB

Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just the largest companies, everyone must have effective solutions and a thorough cybersecurity strategy. Whether… Continue Reading

Recent Attack Types Against Cloud Infrastructures
September 9, 2022

Recent Attack Types Against Cloud Infrastructures

Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading

How XDR Powers Rapid Attack Detection and Response
September 7, 2022

How XDR Powers Rapid Attack Detection and Response

A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends can be expressed simply as follows; Increase in the on-demand ubiquitous data access &… Continue Reading

Top Open Source Solutions for Building Security Operations Center II
August 31, 2022

Top Open Source Solutions for Building Security Operations Center II

A Security Operations Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology to continually monitor and enhance an organization's security posture. It also prevents, identifies, analyzes, and reacts to cybersecurity… Continue Reading

All You Need to Know About Endpoint Security
August 29, 2022

All You Need to Know About Endpoint Security

Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market's compound annual growth rate (CAGR), it is estimated that the market will double in 9 years. According… Continue Reading

How to Detect Reconnaissance Using MITRE ATT&CK Framework
August 2, 2022

How to Detect Reconnaissance Using MITRE ATT&CK Framework

In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to detect cyberattacks using MITRE ATT&CK Framework, and how we can protect ourselves and… Continue Reading

Top 5 Free Attack Surface Management Tools
July 28, 2022

Top 5 Free Attack Surface Management Tools

Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization's IT infrastructure.  What is Attack Surface Management?  While similar in nature to asset discovery or asset management, frequently… Continue Reading

What is Domain Hijacking and How to Prevent
July 26, 2022

What is Domain Hijacking and How to Prevent

Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading

Top 5 Tools for Phishing Domain Detection
July 25, 2022

Top 5 Tools for Phishing Domain Detection

Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against such attacks. However, the attackers develop new TTPs with the… Continue Reading

What is Deep Web Monitoring?
July 22, 2022

What is Deep Web Monitoring?

There are a variety of network monitoring and perimeter protection solutions available for both personal and commercial networks. Nevertheless, even the most protected businesses may fall prey to a cyber assault. The terrifying aspect of this… Continue Reading

What is BEC Attack and How to Prevent it?
July 21, 2022

What is BEC Attack and How to Prevent it?

BEC attack is a type of social engineering attack that takes place over email and the attacker aims for financial gain. Often, attackers aim to trick employees into sending money or valuable personal data (PII)… Continue Reading

What is Spoofing Attack and How to Prevent It?
July 20, 2022

What is Spoofing Attack and How to Prevent It?

In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal money, or transmit malware. How Does Spoofing Work? Spoofing often consists of… Continue Reading

How to Build a Proactive Incident Response Plan?
July 19, 2022

How to Build a Proactive Incident Response Plan?

Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. Despite all these precautions, sometimes employees can fall victim to social engineering attacks due to unawareness and ignorance.… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo