Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
socprime.com
socprime.com
SmokeLoader Malware Detection: Notorious Loader Reemerges to Target Companies in Taiwan – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The nefarious SmokeLoader malware resurfaces in the cyber threat arena...
socprime.com
Using a Custom Script to Trigger an Action in Monit – Source: socprime.com
Source: socprime.com - Author: Oleh P. WRITTEN BY Oleh P. SOC Engineer [post-views] December 03, 2024...
socprime.com
Calculating Session Duration in Logstash Using Ruby – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 03, 2024 · 3 min read When processing...
socprime.com
AWS WAF: Overriding Rule Actions in a Rule Group – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 03, 2024...
socprime.com
How to Update GeoLite2 Database in ArcSight Manager – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 03, 2024 · 2 min read To update...
socprime.com
Finalizing Your AWS WAF Web ACL Configuration – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 02, 2024...
socprime.com
Configuring Elasticsearch Authentication with LDAPS – Source: socprime.com
Source: socprime.com - Author: Oleksandr L LDAP (Lightweight Directory Access Protocol) is a popular method for...
socprime.com
Get started with ISM (Index State Management) – Source: socprime.com
Source: socprime.com - Author: Oleh P. To start with Index State Management, first of all, you...
socprime.com
HATVIBE and CHERRYSPY Malware Detection: Cyber-Espionage Campaign Conducted by TAG-110 aka UAC-0063 Targeting Organizations in Asia and Europe – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko For nearly three years since the full-scale war in Ukraine...
socprime.com
AWS WAF: Creating Custom String Match Rule – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] November 29, 2024...
socprime.com
Addressing read_only_allow_delete After Disk Space Issues – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] November 29, 2024 · 7 min read Occasionally, as...
socprime.com
How to Check What Task is Stuck and Cancel it on Dev-tools – Source: socprime.com
Source: socprime.com - Author: Oleh P. [post-views] November 29, 2024 · 1 min read I had...
socprime.com
Handling the Dynamic Pruning Failure in Cardinality Aggregations in Elasticsearch – Source: socprime.com
Source: socprime.com - Author: Oleksii K. [post-views] November 28, 2024 · 3 min read When working...
socprime.com
OpenSearch Alert Monitoring: High CPU Usage Example – Source: socprime.com
Source: socprime.com - Author: Oleksii K. [post-views] November 28, 2024 · 3 min read OpenSearch alerting...
socprime.com
How to Retrieve and Restore Snapshots from S3 Repository in OpenSearch – Source: socprime.com
Source: socprime.com - Author: Oleksii K. [post-views] November 28, 2024 · 2 min read Step 1:...
socprime.com
Creating Snapshot Management Policies with Keystore Integration and Slack Notification Setup – Source: socprime.com
Source: socprime.com - Author: Oleksii K. Step 1: Add AWS Credentials to the Keystore To securely...
socprime.com
Making Use of Building Block Rules in Elastic – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Fields Aren’t Always Faster, Keyword Searches to Speed Up Splunk – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Making Use of Fillnull and Values() to Increase Rule Resiliency in Splunk – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Creating Macros for Code Reuse in Splunk – Source: socprime.com
Source: socprime.com - Author: John Stevens [post-views] November 27, 2024 · 2 min read When you...
socprime.com
Extracting fields in SPL – Source: socprime.com
Source: socprime.com - Author: John Stevens [post-views] November 25, 2024 · 2 min read Sometimes when...
socprime.com
Elastic Flattened Fields Explained – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Splunk: How to Make Lookup Based on Wildcards – Source: socprime.com
Source: socprime.com - Author: Alex Verbniak WRITTEN BY Alex Verbniak Senior Security Engineer [post-views] November 25,...
socprime.com
Splunk: How to Output Nested json as One Field – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
BlackSuit Ransomware Detection: Ignoble Scorpius Escalates Attacks, Targets 90+ Organizations Worldwide – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Emerging last year as the successor to Royal ransomware, BlackSuit...
socprime.com
BianLian Ransomware Detection: AA23-136A Joint Cybersecurity Advisory Details on TTPs Leveraged by BianLian Operators in the Ongoing Malicious Campaigns – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Following a wave of cyber attacks by the Iran-linked hacking...
socprime.com
Fickle Stealer Malware Detection: New Rust-Based Stealer Disguises as Legitimate Software to Steal Data from Compromised Devices – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko A new Rust-based stealer malware dubbed Fickle Stealer has come...
socprime.com
PXA Stealer Detection: Vietnamese Hackers Hit the Public and Education Sectors in Europe and Asia – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hot on the heels of the recent wave of cyber-attacks...
socprime.com
New Remcos RAT Activity Detection: Phishing Campaign Spreading a Novel Fileless Malware Variant – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Cybersecurity researchers have identified an ongoing in-the-wild adversary campaign, which...
socprime.com
Interlock Ransomware Detection: High-Profile and Double-Extortion Attacks Using a New Ransomware Variant – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Adversaries employ new Interlock ransomware in recently observed big-game hunting...
Posts navigation
1
2
Latest News
The Register Security
Discover the future of Linux security – Source: go.theregister.com
03/12/2024
The Register Security
Russia arrests one of its own – a cybercrime suspect on FBI’s most wanted list – Source: go.theregister.com
03/12/2024
The Register Security
Telco security is a dumpster fire and everyone’s getting burned – Source: go.theregister.com
03/12/2024
securityweek.com
AWS Launches Incident Response Service – Source: www.securityweek.com
03/12/2024
securityweek.com
Prototype UEFI Bootkit is South Korean University Project; LogoFAIL Exploit Discovered – Source: www.securityweek.com
03/12/2024
securityweek.com
Cybersecurity M&A Roundup: 49 Deals Announced in November 2024 – Source: www.securityweek.com
03/12/2024