SOC Prime

@SOC_Prime

SOC Prime engineers security software to help organizations in building cutting-edge defense capabilities against the future cyber attacks.

United States
Vrijeme pridruživanja: lipanj 2015.

Tweetovi

Blokirali ste korisnika/cu @SOC_Prime

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SOC_Prime

  1. prije 8 sati

    group used backdoor sample containing record-breaking 17 modules in a highly targeted cyber espionage campaign.

    Poništi
  2. prije 14 sati
    Poništi
  3. prije 17 sati

    Check free online translator for saved searches, filters, queries, API requests, correlation and rules:

    Poništi
  4. 31. sij

    added new features to backdoor making it more stealthy and cut off multiple functions, so it now supports Chrome password dumping only.

    Poništi
  5. 31. sij

    Premium Log Source Pack contains config files for logstash and API pulling scripts that enable smooth and fast integration of 52 log sources with the platform.

    Poništi
  6. 31. sij

    The article shows that effective usage requires a plan, strong cross-functional collaboration, and a clear intent to structure data early on.

    Poništi
  7. 30. sij

    encrypted systems of Virginia-based US government contractor, Electronic Warfare Associates.

    Poništi
  8. 30. sij

    Detect incidents and security violations in the Microsoft Office365 SaaS platform with and ready-to-deploy rule pack by SOC Prime.

    Poništi
  9. 30. sij

    New rule by Ariel Millahuel detects the utilization of Powershell to set registry key for persistence.

    Poništi
  10. 29. sij

    Magento issued fresh updates to address 6 critical and important , two of which could be exploited for arbitrary code execution.

    Poništi
  11. 29. sij

    Security Monitor enables real-time traffic profiling and helps to discover volume-based data leakage or attacks without signatures.

    Poništi
  12. 29. sij

    Create rules online in a matter of minutes and link them directly to your SOC operations.

    Poništi
  13. 28. sij

    targeted about 30% of Apple computers in the United States attempting to install the next-stage payloads.

    Poništi
  14. 28. sij

    Uncover usage of honey credentials and spots signs of malware activity or cyberattack with Mimikatz Defence Framework rule pack available on Threat Detection Marketplace.

    Poništi
  15. 28. sij

    Join our Developer Program to ultimately increase the defense capabilities of community and earn money by writing threat detection rules.

    Poništi
  16. 27. sij

    CVE-2019-19781 vulnerability is finally patched, but gangs continue scanning for unpatched Citrix appliances.

    Poništi
  17. 27. sij

    DNS Security Check analyzes traffic & processes server logs (like Microsoft Trace Logs, BIND or other) to uncover tunneling and malware activity

    Poništi
  18. 27. sij

    Join our webinar tomorrow to learn about leveraging the Framework for and strategic Blue Team operations.

    Poništi
  19. 24. sij

    can download files encoded in base64 on Google Drive, post data into Google Forms, and exfiltrate the screenshots via the ImgBB website.

    Poništi
  20. 24. sij

    Unleash the maximum potential for every analyst on your SOC and team with Workflow App.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·