Blog

Latest articles from SOCRadar

What are Threat Hunting Tools?
June 2, 2022

What are Threat Hunting Tools?

Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunting is searching for new possible risks and vulnerabilities beyond recognized alerts or malicious… Continue Reading

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
June 1, 2022

Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware

Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breaches for cybersecurity experts and leaders worldwide. The report includes reviews of around 24,000 cybersecurity incidents that… Continue Reading

Stop BEC Attacks with SOCRadar Takedown Processes
May 25, 2022

Stop BEC Attacks with SOCRadar Takedown Processes

Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious threat to organizations. The numbers in the "Phishing Activity Trends Reports" of the last quarter… Continue Reading

Attack Surface Management (ASM) in 10 Questions
May 19, 2022

Attack Surface Management (ASM) in 10 Questions

The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface is all hardware, software, and cloud assets that process or store information with access… Continue Reading

Top 10 Twitter Accounts to Follow for Threat Intelligence
May 18, 2022

Top 10 Twitter Accounts to Follow for Threat Intelligence

Threat intelligence feeds on such a broad spectrum that sometimes you'd be surprised to hear where you can get relevant information. Often, it can be nearly impossible to keep track of everything because of the… Continue Reading

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
May 16, 2022

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same type of content. One of the most notable features of the attack was that it quickly… Continue Reading

Common IoT Attacks that Compromise Security
May 13, 2022

Common IoT Attacks that Compromise Security

With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wireless communication networks, via embedded devices. This technology is called, simply the… Continue Reading

What is the Risk-Based Approach to Cybersecurity?
May 12, 2022

What is the Risk-Based Approach to Cybersecurity?

Cybersecurity is one of the main topics for business managers in today's world. The approach to cyber risks has changed from "maturity based" to "risk-based" over time. Managerial leaders want to know the cyber threats to… Continue Reading

What are the Top Ten Data Breaches of All Times?
May 6, 2022

What are the Top Ten Data Breaches of All Times?

In the cyber world that grows and develops with cumulative data accumulation, "small" and short-term data breaches that we think we can ignore from time to time may cause a crisis beyond our estimations. Unlike… Continue Reading

What are STIX/TAXII?
May 4, 2022

What are STIX/TAXII?

The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII are not sharing programs, tools, or software, but rather components and standards that… Continue Reading

Real-Life Examples of Machine Learning in Cybersecurity
May 2, 2022

Real-Life Examples of Machine Learning in Cybersecurity

Artificial Intelligence and Machine Learning: A Thriving Concept in the World of Cybersecurity There’s no question that artificial intelligence and machine learning are two major points of interest in technology in the 21st century. Everyone… Continue Reading

Ethical Issues Behind Cybersecurity
April 28, 2022

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and espionage. As a result, cybersecurity approaches and solutions have become increasingly sophisticated and comprehensive… Continue Reading

How to Use SOCRadar Integrations?
April 19, 2022

How to Use SOCRadar Integrations?

SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platform, Vulnerability Management, Ticketing, and Team Meeting to better serve its customers. Thanks to these integrations, it helps you take action regarding… Continue Reading

Comparing Benefits from Different Security Monitoring Services
April 18, 2022

Comparing Benefits from Different Security Monitoring Services

By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U.S. and China. McAfee states cybercrimes accounted for 14% of the entire… Continue Reading

What Do You Need To Know About Cybersecurity in Power Grids
April 15, 2022

What Do You Need To Know About Cybersecurity in Power Grids

Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading

20 SOCRadar Notifications That Will Make You Feel Safer
April 8, 2022

20 SOCRadar Notifications That Will Make You Feel Safer

SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In addition, up-to-date notifications are provided for you to follow the spotlight actively. In… Continue Reading

What are the Biggest Cybersecurity Risks in North America?
April 6, 2022

What are the Biggest Cybersecurity Risks in North America?

The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading

Microsoft Exchange Server Cyberattack Timeline
April 4, 2022

Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control business networks because it provides an exclusive field that could allow attackers to… Continue Reading

5 Things You Should Know About the Genesis Marketplace
April 1, 2022

5 Things You Should Know About the Genesis Marketplace

[April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genesis as a result of Operation Cookie Monster. Since 2017, the Genesis… Continue Reading

What is Extended Threat Intelligence and How Does it Make a Difference?
March 28, 2022

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?

Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading

SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo