International Cyber Security Days September 21-22, 2022 / Baku, Azerbaijan Join SOCRadar in-person! Set up time to meet with us at International Cyber Security Days in Baku and experience early cyber threat warning system powered with External Attack Surface Management free for 30 days! MEET US AT CYBER SECURITY DAYS Continue Reading
e-Crime & Cybersecurity Congress 2022 September 21, 2022 / Abu Dhabi, United Arab Emirates Join SOCRadar in-person! Set up time to meet with us at e-Crime & Cybersecurity Congress in Abu Dhabi and experience early cyber threat warning system powered with External Attack Surface Management free for 30 days! MEET US AT E-CRIME Continue Reading
SOCRadar is proud to be among the finalists in the "Threat Intelligence Award" category this year at the Computing Security Awards 2022, where companies operating in different fields of the cybersecurity industry compete! Held since… Continue Reading
A Security Operations Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology to continually monitor and enhance an organization's security posture. It also prevents, identifies, analyzes, and reacts to cybersecurity… Continue Reading
Security testing for an application is a crucial element in the lifecycle of software testing. It restricts unwanted intrusions at multiple application layers, including servers, the front-end application layer, middleware modules, and network security. This… Continue Reading
Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market's compound annual growth rate (CAGR), it is estimated that the market will double in 9 years. According… Continue Reading
IBM released security updates for two critical vulnerabilities in its message-oriented middleware IBM MQ. The vulnerabilities, identified as CVE-2022-27780 and CVE-2022-30115, allow for security bypass and exposure of sensitive data. The flaws were both discovered… Continue Reading
As SOCRadar, we aim to obtain the first information security management system certificate in our sector in accordance with the pioneering and innovation principles in the security sector, which we set out with our distinguished business partners throughout the World.For this purpose, we will take all necessary actions: To continuously improve the ISO 27001 Information Security Management System with the participation… Continue Reading
In this month's Patch Tuesday, Microsoft fixed 121 flaws in total, including two zero-day vulnerabilities that are actively exploited. Among 121, 17 vulnerabilities with critical ratings could allow RCE and privilege escalation. The fixed vulnerabilities… Continue Reading
Attackers discovered a way to exploit a vulnerability in PrestaShop servers. The actively exploited zero-day, CVE-2022-36408, allows attackers to execute arbitrary code in an SQL injection attempt and possibly steal customer payment information. Nearly 300,000… Continue Reading
SOCRadar will be at InfoSecurity Europe, held at London ExCel this week from 21 to 23 June. We are very excited to meet you face to face at our booth V38. Visit us to gain… Continue Reading
Whether you work at a startup or in the information security department of a well-established company, you need to attend cybersecurity events to meet with the world's leading cybersecurity experts and vendors. These events, where… Continue Reading
e-Crime & Cybersecurity Congress 2022 June 7, 2022 / Doha, Qatar Join SOCRadar in-person! Set up time to meet with us at e-Crime & Cybersecurity Congress in Qatar and experience early cyber threat warning system powered with External Attack Surface Management free for 30 days! MEET US AT E-CRIME Continue Reading
e-Crime & Cybersecurity Congress 2022 June 2, 2022 / Munich, Germany Join SOCRadar in-person! Set up time to meet with us at e-Crime & Cybersecurity Congress in Munich and experience early cyber threat warning system powered with External Attack Surface Management free for 30 days! MEET US AT E-CRIME Continue Reading
With the development of technology, nowadays, we can connect various everyday devices, such as cars, kitchen appliances, TV, to the internet, or other wireless communication networks, via embedded devices. This technology is called, simply the… Continue Reading
Cybersecurity is one of the main topics for business managers in today's world. The approach to cyber risks has changed from "maturity based" to "risk-based" over time. Managerial leaders want to know the cyber threats to… Continue Reading
Social media is great but a lot of risks and threats have evolved with this social media frenzy. Financial fraud, blackmailing, phishing, invasion of privacy, and identity theft have become commonplace attacks targeted at individuals.… Continue Reading
Artificial Intelligence and Machine Learning: A Thriving Concept in the World of Cybersecurity There’s no question that artificial intelligence and machine learning are two major points of interest in technology in the 21st century. Everyone… Continue Reading
Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and espionage. As a result, cybersecurity approaches and solutions have become increasingly sophisticated and comprehensive… Continue Reading
Cybersecurity encompasses all technologies and techniques that ensure the integrity of computer systems and electronic data. And, at an age where more and more of our business and social lives are conducted online, this is… Continue Reading