What is Spoofing Attack and How to Prevent It?
What is Spoofing Attack and How to Prevent It? In the context of cybersecurity, spoofing is the act of impersonating another entity to earn our trust, obtain access to our systems, steal data, steal m...
How to Build a Proactive Incident Response Plan?
How to Build a Proactive Incident Response Plan? Some standard cybersecurity measures are endpoint security tools, such as VPNs, proxies, antimalware, and employee cybersecurity awareness training. De...
Cyber Kill Chain Model in Cyber Threat Intelligence
Cyber Kill Chain Model in Cyber Threat Intelligence Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks i...
Expectations of SOC Team from CTI
Expectations of SOC Team from CTI Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A ...
7 Books Every CISO Bookshelf Should Have
7 Books Every CISO Bookshelf Should Have The position of Chief Information Security Officer (CISO) is relatively new and has just received recognition from the CxO community and board of directors at ...
10 Best SIEM Tools, Products & Providers List
10 Best SIEM Tools, Products & Providers List SIEM solutions are vital to log management and complete security. Here is a list of the finest SIEM tools for organizations wanting to add or improve ...
Top 5 Phishing Resources for SOC Teams
Top 5 Phishing Resources for SOC Teams Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to ...
Top 5 Tactics Threat Actors Use for Initial Access
Top 5 Tactics Threat Actors Use for Initial Access A short while ago, combined security advice released by several national cybersecurity agencies highlighted the top ten attack vectors most used by t...
What are DevOps, DevSecOps, and Rugged DevOps?
What are DevOps, DevSecOps, and Rugged DevOps? We are hearing these two buzzwords, DevSecOps and DevOps, more frequently. For example, Gartner predicts DevSecOps will reach mainstream adoption within ...
What is Network Performance Monitoring (NPM)?
What is Network Performance Monitoring (NPM)? Network Performance Monitoring (NPM) is assessing the service quality of a network as experienced by users by measuring, visualizing, monitoring, diagnosi...
How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye?
How to Protect Yourself Against Shodan, BinaryEdge and ZoomEye? Have you ever wondered how hackers find the IPs, ports, and services required for their attacks? Some attacks need thousands of host co...
What Do You Need to Know About New SAMA Principles?
What Do You Need to Know About New SAMA Principles? The Kingdom of Saudi Arabia (KSA) has launched a digital transformation program focusing on the banking industry. With the growing digitization of f...
Top 10 Cybersecurity Events You Must Follow
Top 10 Cybersecurity Events You Must Follow Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with ...
What are Threat Hunting Tools?
What are Threat Hunting Tools? Threat hunting is how computer security specialists aggressively seek out and eliminate cyber dangers that have infiltrated their computer network invisibly. Threat hunt...
Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware
Verizon 2022 DBIR: All Sizes of Businesses Suffer from Ransomware Verizon has released the 15th Data Breach Investigations Report (DBIR), an in-depth analysis of trends in cyberattacks and data breach...
Stop BEC Attacks with SOCRadar Takedown Processes
Stop BEC Attacks with SOCRadar Takedown Processes Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious t...
Attack Surface Management (ASM) in 10 Questions
Attack Surface Management (ASM) in 10 Questions The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface ...
Top 10 Twitter Accounts to Follow for Threat Intelligence
Top 10 Twitter Accounts to Follow for Threat Intelligence Threat intelligence feeds on such a broad spectrum that sometimes you’d be surprised to hear where you can get relevant information. Oft...
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs? SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same t...
Common IoT Attacks that Compromise Security
Common IoT Attacks that Compromise Security With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wirel...