Tuesday, October 8, 2024

SOC

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee has discovered uses Lua bytecode to obfuscate its malicious...

AMIDES – Open-source Detection System to Uncover SIEM Blind Points

Cyberattacks pose a significant risk, and prevention alone isn't enough, so timely detection is crucial. That's why most organizations use SIEM (Security Information and...

IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals

IBM has recently announced the launch of its Cloud-Native SIEM solution, which is designed to enhance the scale, speed, and flexibility of security teams....

SOC Fourth Defense Phase – Cyber Threat Intelligence Guide

Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities; the...

Most Enterprise SIEMs Fail Against MITRE ATT&CK Tactics

SIEM (Security Incident and Event Management) tools are being used in most organizations for monitoring, analyzing, and preventing threat actors.Organizations are trying to...

SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks.Most times, cyber-attacks...

Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide

Cyber Security operations center is protecting organizations and the sensitive business data of customers.It ensures active monitoring of valuable assets of the business...

Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure

In earlier years, everyone depends on CyberSOC (including firewalls, WAF, SIEM, etc.) and the priority in building the SOC provides security, and the CIA...

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into Intrusion Prevention System...

SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools – 2023

SOC Training is one of the most critical concerns in building a Quality Security Operation Center Team to fight against advanced threats that target...

Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR

Security information and event management, or SIEM, was introduced some 17 years ago. It makes sense for a next-gen SIEM to emerge now, or...