Blog

Latest articles from SOCRadar

Top Cyber Threats Faced by the Aviation Industry
September 27, 2022

Top Cyber Threats Faced by the Aviation Industry

The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important critical infrastructures, with all its network, assets, and systems. It also interacts with… Continue Reading

How to Detect & Prevent Ransomware Attacks [2022 CISO Edition]
September 26, 2022

How to Detect & Prevent Ransomware Attacks (2022 CISO Edition)

Why is Ransomware One of the First Items on the CISOs Agenda?  Rise with Pandemic With the pandemic, as we rush towards an increasingly digitized world, ransomware has become our institutions' most prevalent cyber threat. … Continue Reading

Top 10 Free Cybersecurity Solutions for SMB
September 21, 2022

Top 10 Free Cybersecurity Solutions for SMB

Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just the largest companies, everyone must have effective solutions and a thorough cybersecurity strategy. Whether… Continue Reading

Recent Attack Types Against Cloud Infrastructures
September 9, 2022

Recent Attack Types Against Cloud Infrastructures

Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading

How XDR Powers Rapid Attack Detection and Response
September 7, 2022

How XDR Powers Rapid Attack Detection and Response

A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends can be expressed simply as follows; Increase in the on-demand ubiquitous data access &… Continue Reading

Top Open Source Solutions for Building Security Operations Center II
August 31, 2022

Top Open Source Solutions for Building Security Operations Center II

A Security Operations Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology to continually monitor and enhance an organization's security posture. It also prevents, identifies, analyzes, and reacts to cybersecurity… Continue Reading

All You Need to Know About Endpoint Security
August 29, 2022

All You Need to Know About Endpoint Security

Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market's compound annual growth rate (CAGR), it is estimated that the market will double in 9 years. According… Continue Reading

How to Detect Reconnaissance Using MITRE ATT&CK Framework
August 2, 2022

How to Detect Reconnaissance Using MITRE ATT&CK Framework

In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to detect cyberattacks using MITRE ATT&CK Framework, and how we can protect ourselves and… Continue Reading

Top 5 Free Attack Surface Management Tools
July 28, 2022

Top 5 Free Attack Surface Management Tools

Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization's IT infrastructure.  What is Attack Surface Management?  While similar in nature to asset discovery or asset management, frequently… Continue Reading

What is Domain Hijacking and How to Prevent
July 26, 2022

What is Domain Hijacking and How to Prevent

Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading

Top 5 Tools for Phishing Domain Detection
July 25, 2022

Top 5 Tools for Phishing Domain Detection

Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against such attacks. However, the attackers develop new TTPs with the… Continue Reading

What is Deep Web Monitoring?
July 22, 2022

What is Deep Web Monitoring?

There are a variety of network monitoring and perimeter protection solutions available for both personal and commercial networks. Nevertheless, even the most protected businesses may fall prey to a cyber assault. The terrifying aspect of this… Continue Reading

What is BEC Attack and How to Prevent it?
July 21, 2022

What is BEC Attack and How to Prevent it?

BEC attack is a type of social engineering attack that takes place over email and the attacker aims for financial gain. Often, attackers aim to trick employees into sending money or valuable personal data (PII)… Continue Reading

What is Spoofing Attack and How to Prevent It?
July 20, 2022

What is Spoofing Attack and How to Prevent It?

In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal money, or transmit malware. How Does Spoofing Work? Spoofing often consists of… Continue Reading

How to Build a Proactive Incident Response Plan?
July 19, 2022

How to Build a Proactive Incident Response Plan?

Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. Despite all these precautions, sometimes employees can fall victim to social engineering attacks due to unawareness and ignorance.… Continue Reading

Cyber Kill Chain Model in Cyber Threat Intelligence
July 14, 2022

Cyber Kill Chain Model in Cyber Threat Intelligence

Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks is very important. However, how can it be possible to reach the maximum potential of… Continue Reading

Expectations of SOC Team from CTI
July 13, 2022

Expectations of SOC Team from CTI

Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A SOC team requires reliable cyber threat intelligence to… Continue Reading

7 Books Every CISO Bookshelf Should Have
July 12, 2022

7 Books Every CISO Bookshelf Should Have

The position of Chief Information Security Officer (CISO) is relatively new and has just received recognition from the CxO community and board of directors at the corporate level. To develop and demonstrate the significance of… Continue Reading

10 Best SIEM Tools, Products & Providers List
July 11, 2022

10 Best SIEM Tools, Products & Providers List

SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve their systems.  SIEM, or security information and event management,… Continue Reading

Top 5 Phishing Resources for SOC Teams
July 6, 2022

Top 5 Phishing Resources for SOC Teams

Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to well-crafted fake websites or malicious links using technics like social engineering. Passwords, financial information,… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo