SOCRadar® Cyber Intelligence Inc. | Stop BEC Attacks with SOCRadar Takedown Processes
May 25, 2022
Stop BEC Attacks with SOCRadar Takedown Processes

Stop BEC Attacks with SOCRadar Takedown Processes Attacks such as phishing, business e-mail compromise (BEC), and malware infection, which are among the fraud activities, increasingly pose a serious t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Attack Surface Management (ASM) in 10 Questions
May 19, 2022
Attack Surface Management (ASM) in 10 Questions

Attack Surface Management (ASM) in 10 Questions The rise of working from home and access to cloud services and the expansion of businesses have increased attack surfaces. The attack surface ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Twitter Accounts to Follow for Threat Intelligence
May 18, 2022
Top 10 Twitter Accounts to Follow for Threat Intelligence

Top 10 Twitter Accounts to Follow for Threat Intelligence Threat intelligence feeds on such a broad spectrum that sometimes you’d be surprised to hear where you can get relevant information. Oft...

Learn More
SOCRadar® Cyber Intelligence Inc. | New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?
May 16, 2022
New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs?

New Playground for Fraudsters: How Do I Get WhatsApp Scam IoCs? SOCRadar analysts, while investigating phishing attacks via WhatsApp, recently found a significant increase in an attack with the same t...

Learn More
SOCRadar® Cyber Intelligence Inc. | Common IoT Attacks that Compromise Security
May 13, 2022
Common IoT Attacks that Compromise Security

Common IoT Attacks that Compromise Security With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wirel...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is the Risk-Based Approach to Cybersecurity?
May 12, 2022
What is the Risk-Based Approach to Cybersecurity?

What is the Risk-Based Approach to Cybersecurity? Cybersecurity is one of the main topics for business managers in today’s world. The approach to cyber risks has changed from “maturity bas...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Top Ten Data Breaches of All Times?
May 06, 2022
What are the Top Ten Data Breaches of All Times?

What are the Top Ten Data Breaches of All Times? In the cyber world that grows and develops with cumulative data accumulation, “small” and short-term data breaches that we think we can ignore from tim...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are STIX/TAXII?
May 04, 2022
What are STIX/TAXII?

What are STIX/TAXII? The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Real-Life Examples of Machine Learning in Cybersecurity
May 02, 2022
Real-Life Examples of Machine Learning in Cybersecurity

Real-Life Examples of Machine Learning in Cybersecurity ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity
Apr 28, 2022
Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and e...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Use SOCRadar Integrations?
Apr 19, 2022
How to Use SOCRadar Integrations?

How to Use SOCRadar Integrations? SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platforms, Vulnerability Management, Ticketing, and Team Me...

Learn More
SOCRadar® Cyber Intelligence Inc. | Comparing Benefits from Different Security Monitoring Services
Apr 18, 2022
Comparing Benefits from Different Security Monitoring Services

Comparing Benefits from Different Security Monitoring Services By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U....

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need To Know About Cybersecurity in Power Grids
Apr 15, 2022
What Do You Need To Know About Cybersecurity in Power Grids

What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...

Learn More
SOCRadar® Cyber Intelligence Inc. | 20 SOCRadar Notifications That Will Make You Feel Safer
Apr 08, 2022
20 SOCRadar Notifications That Will Make You Feel Safer

20 SOCRadar Notifications That Will Make You Feel Safer SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In additio...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Biggest Cybersecurity Risks in North America?
Apr 06, 2022
What are the Biggest Cybersecurity Risks in North America?

What are the Biggest Cybersecurity Risks in North America? The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of...

Learn More
SOCRadar® Cyber Intelligence Inc. | Microsoft Exchange Server Cyberattack Timeline
Apr 04, 2022
Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server Cyberattack Timeline Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control ...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Things You Should Know About the Genesis Marketplace
Apr 01, 2022
5 Things You Should Know About the Genesis Marketplace

5 Things You Should Know About the Genesis Marketplace [April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genes...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?
Mar 28, 2022
What is Extended Threat Intelligence (XTI) and How Does it Make a Diff...

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference? Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intell...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need To Know About Vulnerability Intelligence
Mar 17, 2022
What Do You Need To Know About Vulnerability Intelligence

What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...

Learn More
SOCRadar® Cyber Intelligence Inc. | ISO 27002 and Threat Intelligence: The New Security Standard
Mar 10, 2022
ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27002 and Threat Intelligence: The New Security Standard ...

Learn More

Warning: Undefined variable $postsAll in /var/www/html/wp-content/themes/socradar/category.php on line 175