Blog

Latest articles from SOCRadar

Attack Surface Management (ASM) in 10 Questions
May 19, 2022

Attack Surface Management (ASM) in 10 Questions

The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading

Top 10 Twitter Accounts to Follow for Threat Intelligence
May 18, 2022

Top 10 Twitter Accounts to Follow for Threat Intelligence

Threat intelligence feeds on such a broad spectrum that sometimes you'd be surprised to hear where you can get relevant information. Often, it can be nearly impossible to keep track of everything because of the… Continue Reading

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
May 16, 2022

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same type of content. One of the most notable features of the attack was that it quickly… Continue Reading

Common IoT Attacks that Compromise Security
May 13, 2022

Common IoT Attacks that Compromise Security

With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wireless communication networks, via embedded devices. This technology is called, simply the… Continue Reading

What is the Risk-Based Approach to Cybersecurity?
May 12, 2022

What is the Risk-Based Approach to Cybersecurity?

Cybersecurity is one of the main topics for business managers in today's world. The approach to cyber risks has changed from "maturity based" to "risk-based" over time. Managerial leaders want to know the cyber threats to… Continue Reading

What are STIX/TAXII?
May 4, 2022

What are STIX/TAXII?

The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII are not sharing programs, tools, or software, but rather components and standards that… Continue Reading

Real-Life Examples of Machine Learning in Cybersecurity
May 2, 2022

Real-Life Examples of Machine Learning in Cybersecurity

Artificial Intelligence and Machine Learning: A Thriving Concept in the World of Cybersecurity There’s no question that artificial intelligence and machine learning are two major points of interest in technology in the 21st century. Everyone… Continue Reading

Ethical Issues Behind Cybersecurity
April 28, 2022

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and espionage. As a result, cybersecurity approaches and solutions have become increasingly sophisticated and comprehensive… Continue Reading

How to Use SOCRadar Integrations?
April 19, 2022

How to Use SOCRadar Integrations?

SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platform, Vulnerability Management, Ticketing, and Team Meeting to better serve its customers. Thanks to these integrations, it helps you take action regarding… Continue Reading

Comparing Benefits from Different Security Monitoring Services
April 18, 2022

Comparing Benefits from Different Security Monitoring Services

By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U.S. and China. McAfee states cybercrimes accounted for 14% of the entire… Continue Reading

What Do You Need To Know About Cybersecurity in Power Grids
April 15, 2022

What Do You Need To Know About Cybersecurity in Power Grids

Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading

20 SOCRadar Notifications That Will Make You Feel Safer
April 8, 2022

20 SOCRadar Notifications That Will Make You Feel Safer

SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In addition, up-to-date notifications are provided for you to follow the spotlight actively. In… Continue Reading

What are the Biggest Cybersecurity Risks in North America?
April 6, 2022

What are the Biggest Cybersecurity Risks in North America?

The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading

Microsoft Exchange Server Cyberattack Timeline
April 4, 2022

Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control business networks because it provides an exclusive field that could allow attackers to… Continue Reading

5 Things You Should Know About the Genesis Marketplace
April 1, 2022

5 Things You Should Know About the Genesis Marketplace

The Genesis Market is an automated online store that sells credentials, fingerprints, web platform vulnerabilities, cookies, and various sensitive data that assist cybercriminal hackers in gaining initial access into the targeted victim network. Security researchers… Continue Reading

What is Extended Threat Intelligence and How Does it Make a Difference?
March 28, 2022

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?

Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading

What Do You Need To Know About Vulnerability Intelligence
March 17, 2022

What Do You Need To Know About Vulnerability Intelligence

A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading

iso-27001-27002-2022
March 10, 2022

ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27000 series and their importance  ISO 27000 series consist of the standards determined by the International Organization for Standardization (ISO). It offers the best approaches for information security management systems (ISMS), focusing on controlling… Continue Reading

February 24, 2022

How Can You Avoid Potential Attacks with SOCRadar Integrations?

Today's blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API documents regarding the APIs provided by SOCRadar (used depending on licenses/packages) from this link.  SOCRadar,… Continue Reading

what-is-the-intelligence-cycle
January 31, 2022

What is The Intelligence Cycle?  

The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is referred to as intelligence cycle management. Planning and direction, collecting, processing, exploitation,… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo