Latest Talk
Beyond Phishing: The Rise of MFA Bypass and Session Hijacking Attacks
Explore the evolving threat landscape beyond phishing as cybercriminals increasingly exploit MFA bypass and session hijacking techniques. In this webinar,
SOCRadar's expert will uncover real-world attack scenarios, discuss emerging tactics, and share best practices to strengthen your organization's defense a…
Upcoming talks

Hackers’ Black Market: How Your Company’s Data is Sold and Traded
Gain exclusive insights into the hidden world of underground forums and Telegram groups, where cybercriminals trade sensitive data, exploits, and stolen
credentials. This session will explore what’s being sold, the key players, and the tactics used to evade detection.

How CERT/CSIRT Organizations Can Use Darkweb & Threat Intelligence
This webinar explores how CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams) can effectively leverage
Dark Web monitoring and Threat Intelligence to enhance cybersecurity operations. Attendees will learn to identify emerging threats, detect compromised
data, and proactively respond to cyber risks.

Managing Supply Chain Risks Through Attack Surface Visibility
One of the biggest challenges in cyber risk management is the lack of visibility into the full scope of internal technologies and their associated risks. In this
session, we’ll explore how attack surface management enhances visibility, helping you identify and mitigate supply chain risks more effectively.

AI-Powered Attacks: How Hackers are Weaponizing Artificial Intelligence
AI-Powered Cyber Threats: Staying Ahead of Attackers: Cybercriminals are weaponizing AI for phishing, deepfake social engineering, and LLM-powered
malware. Discover how these threats work and the strategies to stay ahead in the evolving cybersecurity landscape.

Dark Web Threats Targeting the Middle East: A Deep Dive into Cybercriminal Operations
Cybercriminal activity in the Middle East is rising, with threat actors leveraging the dark web to trade stolen data, plan attacks, and exploit regional
vulnerabilities. In this webinar, SOCRadar’s experts will explore the latest dark web threats targeting the region, uncover key cybercriminal tactics, and
provide actionable insights to help organizations strengthen their defenses.

Supply Chain Cyber Attacks: Lessons from MOVEit, 3CX, and SolarWinds
Cybercriminals increasingly target third-party vendors to infiltrate organizations. This session breaks down major supply chain attacks, how attackers exploit
vendor weaknesses, and the critical role of Attack Surface Management (ASM) and Cyber Threat Intelligence (CTI) in preventing them. Join us as we explore
real-world case studies, best practices, and proactive security strategies for safeguarding your organization’s supply chain ecosystem.
On-demand talks

Beyond Phishing: The Rise of MFA Bypass and Session Hijacking Attacks
Explore the evolving threat landscape beyond phishing as cybercriminals increasingly exploit MFA bypass and session hijacking techniques. In this webinar,
SOCRadar's expert will uncover real-world attack scenarios, discuss emerging tactics, and share best practices to strengthen your organization's defense
against these advanced threats.

Training: Mastering Ransomware Negotiations
Free Training for the first 99 registrations! This training is ideal for cybersecurity professionals, IT managers, and decision-makers responsible for their
organization’s response to ransomware threats. Whether you want to enhance your negotiation skills or gain a deeper understanding of ransomware tactics,
this course will equip you with the necessary knowledge and tools. You’ll gain comprehensive knowledge about ransomware, including understanding differ…

Mastering Incident Response: A SOCRadar Approach
In today’s rapidly evolving cyber threat landscape, mastering incident response is critical for organizations aiming to safeguard their assets and maintain
operational integrity. Join us for “Mastering Incident Response: A SOCRadar Approach,” where Habib Aydogmus, our Customer Success Manager, will share
expert insights on developing a robust incident response strategy. This webinar will cover: • The Importance of Incident Response: Understand why having…

Understanding the Attack Chain
Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks is very important.
However, how can it be possible to reach the maximum potential of the cybersecurity system? In that case, the Cyber Kill Chain comes into play with its
layered security structure.

How Threat Intelligence Strengthens Third-Party Risk Management
Join Ali Marwani as he discusses the vital role of Cyber Threat Intelligence (CTI) in managing third-party risks. This webinar will highlight key strategies for
identifying and mitigating vulnerabilities in your supply chain, ensuring you’re equipped to manage cybersecurity, operational, and compliance risks. Register
now to secure your spot and learn how to bolster your third-party risk management practices.

Defending the Digital Economy: Cybersecurity for Africa’s Emerging Markets
As Africa's financial markets evolve and embrace the digital economy, the importance of robust cybersecurity measures has never been greater. This
webinar explores the unique challenges and opportunities within Africa's burgeoning digital financial landscape, highlighting how businesses and institutions
can secure their systems, protect customer data, and build trust in an era of rapid technological growth.