channel company logo

SOCRadar Extended Threat Intelligence

Your Eyes Beyond

SOCRadar is a leading provider of Extended Threat Intelligence (XTI) solutions, offering proactive identification and analysis of cyber threats with actionable
intelligence. With a commitment to excellence and innovation, SOCRadar delivers comprehensive cyber threat intelligence to empower organizations
  • 5,493 Subscribers
  • 37 talks

Your Eyes Beyond

SOCRadar is a leading provider of Extended Threat Intelligence (XTI) solutions, offering proactive identification and analysis of cyber threats with actionable
intelligence. With a commitment to excellence and innovation, SOCRadar delivers comprehensive cyber threat intelligence to empower organizations
  • 5,493 Subscribers
  • 37 talks

Upcoming talks

Hackers’ Black Market: How Your Company’s Data is Sold and Traded

Hackers’ Black Market: How Your Company’s Data is Sold and Traded

Gain exclusive insights into the hidden world of underground forums and Telegram groups, where cybercriminals trade sensitive data, exploits, and stolen
credentials. This session will explore what’s being sold, the key players, and the tactics used to evade detection.

How CERT/CSIRT Organizations Can Use Darkweb & Threat Intelligence

How CERT/CSIRT Organizations Can Use Darkweb & Threat Intelligence

This webinar explores how CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams) can effectively leverage
Dark Web monitoring and Threat Intelligence to enhance cybersecurity operations. Attendees will learn to identify emerging threats, detect compromised
data, and proactively respond to cyber risks.

Managing Supply Chain Risks Through Attack Surface Visibility

Managing Supply Chain Risks Through Attack Surface Visibility

One of the biggest challenges in cyber risk management is the lack of visibility into the full scope of internal technologies and their associated risks. In this
session, we’ll explore how attack surface management enhances visibility, helping you identify and mitigate supply chain risks more effectively.

AI-Powered Attacks: How Hackers are Weaponizing Artificial Intelligence

AI-Powered Attacks: How Hackers are Weaponizing Artificial Intelligence

AI-Powered Cyber Threats: Staying Ahead of Attackers: Cybercriminals are weaponizing AI for phishing, deepfake social engineering, and LLM-powered
malware. Discover how these threats work and the strategies to stay ahead in the evolving cybersecurity landscape.

Dark Web Threats Targeting the Middle East: A Deep Dive into Cybercriminal Operations

Dark Web Threats Targeting the Middle East: A Deep Dive into Cybercriminal Operations

Cybercriminal activity in the Middle East is rising, with threat actors leveraging the dark web to trade stolen data, plan attacks, and exploit regional
vulnerabilities. In this webinar, SOCRadar’s experts will explore the latest dark web threats targeting the region, uncover key cybercriminal tactics, and
provide actionable insights to help organizations strengthen their defenses.

Supply Chain Cyber Attacks: Lessons from MOVEit, 3CX, and SolarWinds

Supply Chain Cyber Attacks: Lessons from MOVEit, 3CX, and SolarWinds

Cybercriminals increasingly target third-party vendors to infiltrate organizations. This session breaks down major supply chain attacks, how attackers exploit
vendor weaknesses, and the critical role of Attack Surface Management (ASM) and Cyber Threat Intelligence (CTI) in preventing them. Join us as we explore
real-world case studies, best practices, and proactive security strategies for safeguarding your organization’s supply chain ecosystem.

On-demand talks

Beyond Phishing: The Rise of MFA Bypass and Session Hijacking Attacks

Beyond Phishing: The Rise of MFA Bypass and Session Hijacking Attacks

Explore the evolving threat landscape beyond phishing as cybercriminals increasingly exploit MFA bypass and session hijacking techniques. In this webinar,
SOCRadar's expert will uncover real-world attack scenarios, discuss emerging tactics, and share best practices to strengthen your organization's defense
against these advanced threats.

Training: Mastering Ransomware Negotiations

Training: Mastering Ransomware Negotiations

Free Training for the first 99 registrations! This training is ideal for cybersecurity professionals, IT managers, and decision-makers responsible for their
organization’s response to ransomware threats. Whether you want to enhance your negotiation skills or gain a deeper understanding of ransomware tactics,
this course will equip you with the necessary knowledge and tools. You’ll gain comprehensive knowledge about ransomware, including understanding differ…

TI and Architecting Hyper Resilient Cyber Defense in Hybrid and Multi-Cloud Environments

TI and Architecting Hyper Resilient Cyber Defense in Hybrid and Multi-Cloud Environments

TI and Architecting Hyper Resilient Cyber Defense in Hybrid and Multi-Cloud Environments

Mastering Incident Response: A SOCRadar Approach

Mastering Incident Response: A SOCRadar Approach

In today’s rapidly evolving cyber threat landscape, mastering incident response is critical for organizations aiming to safeguard their assets and maintain
operational integrity. Join us for “Mastering Incident Response: A SOCRadar Approach,” where Habib Aydogmus, our Customer Success Manager, will share
expert insights on developing a robust incident response strategy. This webinar will cover: • The Importance of Incident Response: Understand why having…

Understanding the Attack Chain

Understanding the Attack Chain

Cybersecurity helps to reduce the risk of cyber-attacks and to eliminate the risks. Finding out the best solution to prevent the attacks is very important.
However, how can it be possible to reach the maximum potential of the cybersecurity system? In that case, the Cyber Kill Chain comes into play with its
layered security structure.

Zero to Hero using Threat Intelligence / De cero a heroe usando threat intelligence - Spanish

Zero to Hero using Threat Intelligence / De cero a heroe usando threat intelligence - Spanish

De cero a heroe usando threat intelligence

How Threat Intelligence Strengthens Third-Party Risk Management

How Threat Intelligence Strengthens Third-Party Risk Management

Join Ali Marwani as he discusses the vital role of Cyber Threat Intelligence (CTI) in managing third-party risks. This webinar will highlight key strategies for
identifying and mitigating vulnerabilities in your supply chain, ensuring you’re equipped to manage cybersecurity, operational, and compliance risks. Register
now to secure your spot and learn how to bolster your third-party risk management practices.

Defending the Digital Economy: Cybersecurity for Africa’s Emerging Markets

Defending the Digital Economy: Cybersecurity for Africa’s Emerging Markets

As Africa's financial markets evolve and embrace the digital economy, the importance of robust cybersecurity measures has never been greater. This
webinar explores the unique challenges and opportunities within Africa's burgeoning digital financial landscape, highlighting how businesses and institutions
can secure their systems, protect customer data, and build trust in an era of rapid technological growth.