GBH
GBH

Bhuvanesh Prabhakaran

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the Attack Chain. Let's move on to the phases of SOC and advanced level of protecting...

CoronaVirus Cyber Attack Panic – Threat Actors Targets Victims Worldwide

Spammers are using the Coronavirus outbreak to spread malware via emails claiming to be “Offer information on how to defend against the real-world virus”, according to Bleeping Computer, which attributed the campaign to Emotet. Cybercriminals are taking advantage of...
spot_img

latest articles