Blog

Latest articles from SOCRadar

Real-Life Examples of Machine Learning in Cybersecurity
May 2, 2022

Real-Life Examples of Machine Learning in Cybersecurity

Artificial Intelligence and Machine Learning: A Thriving Concept in the World of Cybersecurity There’s no question that artificial intelligence and machine learning are two major points of interest in technology in the 21st century. Everyone… Continue Reading

Ethical Issues Behind Cybersecurity
April 28, 2022

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and espionage. As a result, cybersecurity approaches and solutions have become increasingly sophisticated and comprehensive… Continue Reading

How to Use SOCRadar Integrations?
April 19, 2022

How to Use SOCRadar Integrations?

SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platform, Vulnerability Management, Ticketing, and Team Meeting to better serve its customers. Thanks to these integrations, it helps you take action regarding… Continue Reading

Comparing Benefits from Different Security Monitoring Services
April 18, 2022

Comparing Benefits from Different Security Monitoring Services

By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U.S. and China. McAfee states cybercrimes accounted for 14% of the entire… Continue Reading

What Do You Need To Know About Cybersecurity in Power Grids
April 15, 2022

What Do You Need To Know About Cybersecurity in Power Grids

Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become more connected and smarter. Unlike in the past, when a power outage impacted… Continue Reading

20 SOCRadar Notifications That Will Make You Feel Safer
April 8, 2022

20 SOCRadar Notifications That Will Make You Feel Safer

SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In addition, up-to-date notifications are provided for you to follow the spotlight actively. In… Continue Reading

What are the Biggest Cybersecurity Risks in North America?
April 6, 2022

What are the Biggest Cybersecurity Risks in North America?

The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of putting forward a renewed cyber security strategy, both at the country, organization, and sector… Continue Reading

Microsoft Exchange Server Cyberattack Timeline
April 4, 2022

Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control business networks because it provides an exclusive field that could allow attackers to… Continue Reading

5 Things You Should Know About the Genesis Marketplace
April 1, 2022

5 Things You Should Know About the Genesis Marketplace

The Genesis Market is an automated online store that sells credentials, fingerprints, web platform vulnerabilities, cookies, and various sensitive data that assist cybercriminal hackers in gaining initial access into the targeted victim network. Security researchers… Continue Reading

What is Extended Threat Intelligence and How Does it Make a Difference?
March 28, 2022

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?

Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intelligence solutions are insufficient to protect critical infrastructures such as production, transportation, security, and healthcare. This is where Extended Threat… Continue Reading

What Do You Need To Know About Vulnerability Intelligence
March 17, 2022

What Do You Need To Know About Vulnerability Intelligence

A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could lead to the leaking of sensitive information, system manipulation, or genuine users being… Continue Reading

iso-27001-27002-2022
March 10, 2022

ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27000 series and their importance  ISO 27000 series consist of the standards determined by the International Organization for Standardization (ISO). It offers the best approaches for information security management systems (ISMS), focusing on controlling… Continue Reading

February 24, 2022

How Can You Avoid Potential Attacks with SOCRadar Integrations?

Today's blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API documents regarding the APIs provided by SOCRadar (used depending on licenses/packages) from this link.  SOCRadar,… Continue Reading

what-is-the-intelligence-cycle
January 31, 2022

What is The Intelligence Cycle?  

The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is referred to as intelligence cycle management. Planning and direction, collecting, processing, exploitation,… Continue Reading

February 8, 2021

CTI is So Critical to SOC Teams for DNS Security

Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per day. These statistics alone can show how critical DNS security is. Many monitoring… Continue Reading

by
November 5, 2020

OSINT for Digital Asset Discovery

OSINT(Open Source Intelligence) can be used by attackers to identify assets and gather other useful information before the attack is initiated. Asset discovery takes a constructive approach which allows companies to recognize prior risk areas.… Continue Reading

by
Futuristic business investment information technology
October 29, 2020

The Role of Cyber Threat Intelligence Analyst

Who are CTI analysts? Cyber threat analysts are specialists in cyber threat, who use their analytical and technological skills to address complex cyber threat challenge issues, generate detailed reports, and brief the company on short… Continue Reading

by
August 30, 2020

How to Build a SOC With Open Source Solutions?

The SOC is the information security department that continually tracks, analyzes, and enhances the security situation of an enterprise. The goal of the SOC team is, using technological solutions and powerful process management, to identify,… Continue Reading

by
August 24, 2020

How to Empower Your SOC Teams with Cyber Threat Intelligence?

SOC teams have to monitor, analyze, and manage the great volumes of warnings and alerts created by the networks. It takes too long to go over and investigate these warnings and alerts. Too much alert… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo