Blog

Latest articles from SOCRadar

Expectations of SOC Team from CTI
July 13, 2022

Expectations of SOC Team from CTI

Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A SOC team requires reliable cyber threat intelligence to… Continue Reading

7 Books Every CISO Bookshelf Should Have
July 12, 2022

7 Books Every CISO Bookshelf Should Have

The position of Chief Information Security Officer (CISO) is relatively new and has just received recognition from the CxO community and board of directors at the corporate level. To develop and demonstrate the significance of… Continue Reading

10 Best SIEM Tools, Products & Providers List
July 11, 2022

10 Best SIEM Tools, Products & Providers List

SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve their systems.  SIEM, or security information and event management,… Continue Reading

Top 5 Phishing Resources for SOC Teams
July 6, 2022

Top 5 Phishing Resources for SOC Teams

Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to well-crafted fake websites or malicious links using technics like social engineering. Passwords, financial information,… Continue Reading

Top 5 Tactics Threat Actors Use for Initial Access
July 5, 2022

Top 5 Tactics Threat Actors Use for Initial Access

A short while ago, combined security advice released by several national cybersecurity agencies highlighted the top ten attack vectors most used by threat actors to access networks. Threat actors take advantage of outdated systems, external… Continue Reading

What are DevOps, DevSecOps, and Rugged DevOps?
July 4, 2022

What are DevOps, DevSecOps, and Rugged DevOps?

We are hearing these two buzzwords, DevSecOps and DevOps, more frequently. For example, Gartner predicts DevSecOps will reach mainstream adoption within two to five years, which means that we will hear about them even more… Continue Reading

What is Network Performance Monitoring (NPM)?
June 28, 2022

What is Network Performance Monitoring (NPM)?

Network Performance Monitoring (NPM) is assessing the service quality of a network as experienced by users by measuring, visualizing, monitoring, diagnosing, optimizing, and reporting on it. NPM aims to identify congestion, maximize throughput, and improve… Continue Reading

How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye? 
June 22, 2022

How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye? 

Have you ever wondered how hackers find the IPs, ports, and services required for their attacks? Some attacks need thousands of host computers to find the vulnerable ones. Hackers do not require sophisticated tools to… Continue Reading

What Do You Need to Know About New SAMA Principles?
June 8, 2022

What Do You Need to Know About New SAMA Principles?

The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of financial services, securing the availability of sensitive data, transactions, and services has become… Continue Reading

Top 10 Cybersecurity Events You Must Follow
June 7, 2022

Top 10 Cybersecurity Events You Must Follow

Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with the world's leading cybersecurity experts and vendors. These events, where… Continue Reading

What are Threat Hunting Tools?
June 2, 2022

What are Threat Hunting Tools?

Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunting is searching for new possible risks and vulnerabilities beyond recognized alerts or malicious… Continue Reading

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
June 1, 2022

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breaches for cybersecurity experts and leaders worldwide. The report includes reviews of around 24,000 cybersecurity incidents that… Continue Reading

Stop BEC Attacks with SOCRadar Takedown Processes
May 25, 2022

Stop BEC Attacks with SOCRadar Takedown Processes

Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious threat to organizations. The numbers in the "Phishing Activity Trends Reports" of the last quarter… Continue Reading

Attack Surface Management (ASM) in 10 Questions
May 19, 2022

Attack Surface Management (ASM) in 10 Questions

The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading

Top 10 Twitter Accounts to Follow for Threat Intelligence
May 18, 2022

Top 10 Twitter Accounts to Follow for Threat Intelligence

Threat intelligence feeds on such a broad spectrum that sometimes you'd be surprised to hear where you can get relevant information. Often, it can be nearly impossible to keep track of everything because of the… Continue Reading

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
May 16, 2022

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same type of content. One of the most notable features of the attack was that it quickly… Continue Reading

Common IoT Attacks that Compromise Security
May 13, 2022

Common IoT Attacks that Compromise Security

With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wireless communication networks, via embedded devices. This technology is called, simply the… Continue Reading

What is the Risk-Based Approach to Cybersecurity?
May 12, 2022

What is the Risk-Based Approach to Cybersecurity?

Cybersecurity is one of the main topics for business managers in today's world. The approach to cyber risks has changed from "maturity based" to "risk-based" over time. Managerial leaders want to know the cyber threats to… Continue Reading

What are the Top Ten Data Breaches of All Times?
May 6, 2022

What are the Top Ten Data Breaches of All Times?

In the cyber world that grows and develops with cumulative data accumulation, "small" and short-term data breaches that we think we can ignore from time to time may cause a crisis beyond our estimations. Unlike… Continue Reading

What are STIX/TAXII?
May 4, 2022

What are STIX/TAXII?

The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII are not sharing programs, tools, or software, but rather components and standards that… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo