Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
socprime
Page 3
socprime
socprime
SOC Prime Threat Bounty — September 2022 Results
socprime
Magniber Ransomware Detection: Threat Actors Spread JavaScript Files Targeting Windows Users
socprime
Interview with Threat Bounty Developer: Wirapong Petshagun
socprime
Detecting Text4Shell (CVE-2022-42889), Critical RCE in Apache Commons Text
socprime
RomCom Backdoor Detection: Cyber Attack on Ukrainian State Bodies Attributed to Cuba Ransomware Operators aka...
socprime
Sigma2SaveLives: Equip Yourself with Curated Sigma Rules While Donating to Save Lives in Ukraine
socprime
SOC Prime Achieves SOC 2 Type II Compliance for the Second Year in a Row
socprime
PURPLEURCHIN Campaign Detection: A New Crypto Mining Operation Massively Abuses GitHub Actions and Other Popular...
socprime
Sigma2SaveLives: Equip Yourself with Curated Sigma Rules While Donating to Save Lives in Ukraine
socprime
PURPLEURCHIN Campaign Detection: A New Crypto Mining Operation Massively Abuses GitHub Actions and Other Popular...
socprime
RomCom Backdoor Detection: Cyber Attack on Ukrainian State Bodies Attributed to Cuba Ransomware Operators aka...
Lorenz Ransomware Detection: The Group Leverages CVE-2022-29499 Vulnerability in Mitel VoIP Devices
socprime
What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010
socprime
Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover
socprime
TeamTNT Hijacking Servers: Criminal Gang Specializing in Attacking Cloud Environments is Back
socprime
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control
socprime
What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001
socprime
Top Challenges for MSSPs and MDRs and How to Overcome Them
socprime
CVE-2022-35405 Detection: CISA Warns of Adversaries Leveraging ManageEngine RCE Flaw
socprime
NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once
socprime
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control
socprime
What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010
socprime
LAUSD Ransomware Attack: Vice Society Claims Compromising the Largest School District in the US
socprime
OriginLogger Malware Detection: Researchers Shed Light on AgentTesla’s Successor
socprime
SOC Prime Threat Bounty — August 2022 Results
socprime
Lazarus Group Resurfaces, Exploiting Log4j Vulnerability and Spreading MagicRAT
socprime
What is Crypto Malware and How to Defend Against Cryptojacking?
socprime
Golang-Based Agenda Ransomware Detection: New Strain Began Sweeping Across Asia and Africa
socprime
DangerousSavanna Detection: Attacks Targeting Various Financial Orgs Revealed
socprime
New Mirai Botnet Variant Detection: MooBot Sample Targets D-Link Routers
Posts navigation
1
2
3
4
Latest Cyber News
Data Breach Today
Tornado Cash Developer Sentenced to 5 Years in Prison – Source: www.databreachtoday.com
15/05/2024
Data Breach Today
UK, US Officials Warn About Chinese Cyberthreat – Source: www.databreachtoday.com
15/05/2024
securelist.com
QakBot attacks with Windows zero-day (CVE-2024-30051) – Source: securelist.com
14/05/2024
Krebs On Security
Patch Tuesday, May 2024 Edition – Source: krebsonsecurity.com
14/05/2024
The Register Security
FCC names and shames Royal Tiger AI robocall crew – Source: go.theregister.com
14/05/2024
The Register Security
Cybersec chiefs team up with insurers to say ‘no’ to ransomware bullies – Source: go.theregister.com
14/05/2024
The Register Security
Telegram CEO calls out rival Signal, claiming it has ties to US government – Source: go.theregister.com
14/05/2024
The Register Security
Google, Apple gear to raise tracking tag stalker alarm – Source: go.theregister.com
14/05/2024
The Register Security
Visualize your critical cyber risks – Source: go.theregister.com
14/05/2024