What is the Risk-Based Approach to Cybersecurity?
What is the Risk-Based Approach to Cybersecurity? Cybersecurity is one of the main topics for business managers in today’s world. The approach to cyber risks has changed from “maturity bas...
What are the Top Ten Data Breaches of All Times?
What are the Top Ten Data Breaches of All Times? In the cyber world that grows and develops with cumulative data accumulation, “small” and short-term data breaches that we think we can ignore from tim...
What are STIX/TAXII?
What are STIX/TAXII? The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII a...
Real-Life Examples of Machine Learning in Cybersecurity
Real-Life Examples of Machine Learning in Cybersecurity ...
Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity
Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and e...
How to Use SOCRadar Integrations?
How to Use SOCRadar Integrations? SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platforms, Vulnerability Management, Ticketing, and Team Me...
Comparing Benefits from Different Security Monitoring Services
Comparing Benefits from Different Security Monitoring Services By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U....
What Do You Need To Know About Cybersecurity in Power Grids
What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...
20 SOCRadar Notifications That Will Make You Feel Safer
20 SOCRadar Notifications That Will Make You Feel Safer SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In additio...
What are the Biggest Cybersecurity Risks in North America?
What are the Biggest Cybersecurity Risks in North America? The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of...
Microsoft Exchange Server Cyberattack Timeline
Microsoft Exchange Server Cyberattack Timeline Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control ...
5 Things You Should Know About the Genesis Marketplace
5 Things You Should Know About the Genesis Marketplace [April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genes...
What is Extended Threat Intelligence (XTI) and How Does it Make a Diff...
What is Extended Threat Intelligence (XTI) and How Does it Make a Difference? Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intell...
What Do You Need To Know About Vulnerability Intelligence
What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...
ISO 27002 and Threat Intelligence: The New Security Standard
ISO 27002 and Threat Intelligence: The New Security Standard ...
How Can You Avoid Potential Attacks with SOCRadar Integrations?
How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...
What is The Intelligence Cycle?
What is The Intelligence Cycle? The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is ref...
Top 5 Cyberspace Search Engines Used by Security Researchers
Top 5 Cyberspace Search Engines Used by Security Researchers We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for i...
10 Things You Need to Know About CSM (Continuous Security Monitoring) ...
10 Things You Need to Know About CSM (Continuous Security Monitoring) for SOC Environments Defense teams are switching from preventative ideology to early detection and rapid reaction in order to conf...
CTI is So Critical to SOC Teams for DNS Security
CTI is So Critical to SOC Teams for DNS Security Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per ...