Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
socprime.com
socprime.com
EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk Hot on the heels of the re-emergence of a more...
socprime.com
Message Queues vs. Streaming Systems: Key Differences and Use Cases – Source: socprime.com
Source: socprime.com - Author: Oleksii K. In the world of data processing and messaging systems, terms...
socprime.com
What is Event Streaming in Apache Kafka? – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] January 06, 2025...
socprime.com
NonEuclid RAT Detection: Malware Enables Adversaries to Gain Unauthorized Remote Access and Control Over a Targeted System – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The modern-day cyber threat landscape is marked by the rise...
socprime.com
Elasticsearch: Cluster Status is RED – Source: socprime.com
Source: socprime.com - Author: Oleksandr L It happens very rarely, but sometimes your cluster gets red...
socprime.com
Search and Replace Text in SPL Fields with rex – Source: socprime.com
Source: socprime.com - Author: John Stevens [post-views] January 02, 2025 · 1 min read Sometimes when...
socprime.com
CVE-2024-49112 Detection: Zero-Click PoC Exploit for a Critical LDAP RCE Vulnerability Can Crush Unpatched Windows Servers – Source: socprime.com
Source: socprime.com - Author: Daryna Olyniychuk In 2024, vulnerability exploitation accounted for 14% of breach entry...
socprime.com
rare Сommand in Splunk – Source: socprime.com
Source: socprime.com - Author: Justin Erb The rare command in Splunk helps you find the least common values...
socprime.com
coalesce Function in Splunk – Source: socprime.com
Source: socprime.com - Author: Justin Erb WRITTEN BY Justin Erb Threat Hunter [post-views] December 30, 2024...
socprime.com
Strela Stealer Attack Detection: New Malware Variant Now Targets Ukraine Alongside Spain, Italy, and Germany – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Security experts have uncovered a novel Strela Stealer campaign, which...
socprime.com
Reducing Kafka Lag: Optimizing Kafka Performance – Source: socprime.com
Source: socprime.com - Author: Oleksii K. Apache Kafka is a powerful distributed messaging system, but like...
socprime.com
KRaft: Apache Kafka Without ZooKeeper – Source: socprime.com
Source: socprime.com - Author: Oleksii K. Apache Kafka has been a cornerstone of modern event streaming...
socprime.com
Using Kafka as a Fast Correlation Engine – Source: socprime.com
Source: socprime.com - Author: Alex Verbniak In this article, we explore how Kafka Streams can be...
socprime.com
Fluentd: How to Use a Parser With Regular Expression (regexp) – Source: socprime.com
Source: socprime.com - Author: Oleh P. WRITTEN BY Oleh P. SOC Engineer [post-views] December 23, 2024...
socprime.com
Creating a Regex Pattern Set in AWS WAF – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 23, 2024...
socprime.com
OpenSearch Flush, Translog, and Refresh – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] December 23, 2024...
socprime.com
Additional Settings for Optimizing Elasticsearch Cluster Performance – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 23, 2024 · 2 min read When managing...
socprime.com
Understanding Basics of Apache Kafka – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] December 20, 2024...
socprime.com
Using map Command in Splunk – Source: socprime.com
Source: socprime.com - Author: Alex Verbniak WRITTEN BY Alex Verbniak Senior Security Engineer [post-views] December 20,...
socprime.com
Splunk: Using collect Command for Creating New Events in a New Index – Source: socprime.com
Source: socprime.com - Author: Alex Verbniak WRITTEN BY Alex Verbniak Senior Security Engineer [post-views] December 20,...
socprime.com
Enhancing Events with Geolocation Data in Logstash – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 19, 2024 · 2 min read If you...
socprime.com
OpenSearch Split Index API – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] December 19, 2024...
socprime.com
Reindexing in Elasticsearch: A Guide for Administrators – Source: socprime.com
Source: socprime.com - Author: Oleksandr L Reindexing is an essential Elasticsearch operation that enables administrators to...
socprime.com
UAC-0125 Attack Detection: Hackers Use Fake Websites on Cloudflare Workers to Exploit the “Army+” Application – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Hard on the heels of the cyber-espionage campaign by UAC-0099...
socprime.com
Understanding OpenSearch Routing Allocation Settings – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] December 18, 2024...
socprime.com
Using Ruby Code in Logstash for Translating Text from HEX – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 18, 2024 · 2 min read In Elasticsearch...
socprime.com
Fluentd: Work With Multiple Log Sources Within a Single Instance by Using @label – Source: socprime.com
Source: socprime.com - Author: Oleh P. WRITTEN BY Oleh P. SOC Engineer [post-views] December 18, 2024...
socprime.com
DarkGate Malware Attack Detection: Voice Phishing via Microsoft Teams Leads to Malware Distribution – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko Researchers have uncovered a new malicious campaign using voice phishing...
socprime.com
Monitoring Index Size Trends in Elasticsearch: Monthly and Daily Statistics – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 17, 2024 · 3 min read Tracking the...
socprime.com
Understanding Key OpenSearch Dashboard Logging Settings – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] December 17, 2024...
Posts pagination
1
…
6
7
8
…
11
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025