Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
socprime.com
socprime.com
Enhancing Request Handling with Custom Headers in AWS WAF – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 06, 2024...
socprime.com
Generating a CSR and Using an External Certificate with Elasticsearch – Source: socprime.com
Source: socprime.com - Author: Oleksandr L This guide is aimed at beginners and provides a step-by-step...
socprime.com
OpenSearch: How to Fix Security Analytics Error When You Try to Create a New Detector – Source: socprime.com
Source: socprime.com - Author: Oleh P. WRITTEN BY Oleh P. SOC Engineer [post-views] December 06, 2024...
socprime.com
RevC2 and Venom Loader Detection: New Malware Strains Massively Deployed via MaaS in a Sophisticated Campaign – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko New day, a new menace for cyber defenders. Recently, security...
socprime.com
Resizing Persistent Volume Claims (PVCs) for OpenSearch in Kubernetes: Challenges and Solutions – Source: socprime.com
Source: socprime.com - Author: Oleksii K. Managing storage requirements for an OpenSearch cluster deployed via a...
socprime.com
OpenSearch: How to Update index-pattern in “Broken” Visualization – Source: socprime.com
Source: socprime.com - Author: Rosty H. [post-views] December 05, 2024 · 1 min read If index-pattern...
socprime.com
Adding Processing Timestamp and Hostname in Logstash Using Ruby – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 04, 2024 · 3 min read When processing...
socprime.com
Filebeat: Receiving Docker logs in Kafka – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 04, 2024...
socprime.com
OpenSearch Circuit Breakers – Source: socprime.com
Source: socprime.com - Author: Oleksii K. WRITTEN BY Oleksii K. DevOps Engineer [post-views] December 04, 2024...
socprime.com
Splunk: How to Write a Query to Monitor Multiple Sources and Send Alert if they Stop Coming – Source: socprime.com
Source: socprime.com - Author: Oleh P. WRITTEN BY Oleh P. SOC Engineer [post-views] December 04, 2024...
socprime.com
SmokeLoader Malware Detection: Notorious Loader Reemerges to Target Companies in Taiwan – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko The nefarious SmokeLoader malware resurfaces in the cyber threat arena...
socprime.com
Using a Custom Script to Trigger an Action in Monit – Source: socprime.com
Source: socprime.com - Author: Oleh P. WRITTEN BY Oleh P. SOC Engineer [post-views] December 03, 2024...
socprime.com
Calculating Session Duration in Logstash Using Ruby – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 03, 2024 · 3 min read When processing...
socprime.com
AWS WAF: Overriding Rule Actions in a Rule Group – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 03, 2024...
socprime.com
How to Update GeoLite2 Database in ArcSight Manager – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] December 03, 2024 · 2 min read To update...
socprime.com
Finalizing Your AWS WAF Web ACL Configuration – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] December 02, 2024...
socprime.com
Configuring Elasticsearch Authentication with LDAPS – Source: socprime.com
Source: socprime.com - Author: Oleksandr L LDAP (Lightweight Directory Access Protocol) is a popular method for...
socprime.com
Get started with ISM (Index State Management) – Source: socprime.com
Source: socprime.com - Author: Oleh P. To start with Index State Management, first of all, you...
socprime.com
HATVIBE and CHERRYSPY Malware Detection: Cyber-Espionage Campaign Conducted by TAG-110 aka UAC-0063 Targeting Organizations in Asia and Europe – Source: socprime.com
Source: socprime.com - Author: Veronika Telychko For nearly three years since the full-scale war in Ukraine...
socprime.com
AWS WAF: Creating Custom String Match Rule – Source: socprime.com
Source: socprime.com - Author: Comrade H. WRITTEN BY Comrade H. WAF Engineer [post-views] November 29, 2024...
socprime.com
Addressing read_only_allow_delete After Disk Space Issues – Source: socprime.com
Source: socprime.com - Author: Oleksandr L [post-views] November 29, 2024 · 7 min read Occasionally, as...
socprime.com
How to Check What Task is Stuck and Cancel it on Dev-tools – Source: socprime.com
Source: socprime.com - Author: Oleh P. [post-views] November 29, 2024 · 1 min read I had...
socprime.com
Handling the Dynamic Pruning Failure in Cardinality Aggregations in Elasticsearch – Source: socprime.com
Source: socprime.com - Author: Oleksii K. [post-views] November 28, 2024 · 3 min read When working...
socprime.com
OpenSearch Alert Monitoring: High CPU Usage Example – Source: socprime.com
Source: socprime.com - Author: Oleksii K. [post-views] November 28, 2024 · 3 min read OpenSearch alerting...
socprime.com
How to Retrieve and Restore Snapshots from S3 Repository in OpenSearch – Source: socprime.com
Source: socprime.com - Author: Oleksii K. [post-views] November 28, 2024 · 2 min read Step 1:...
socprime.com
Creating Snapshot Management Policies with Keystore Integration and Slack Notification Setup – Source: socprime.com
Source: socprime.com - Author: Oleksii K. Step 1: Add AWS Credentials to the Keystore To securely...
socprime.com
Making Use of Building Block Rules in Elastic – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Fields Aren’t Always Faster, Keyword Searches to Speed Up Splunk – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Making Use of Fillnull and Values() to Increase Rule Resiliency in Splunk – Source: socprime.com
Source: socprime.com - Author: Adam Swan WRITTEN BY Adam Swan Threat Hunting Engineering Lead [post-views] November...
socprime.com
Creating Macros for Code Reuse in Splunk – Source: socprime.com
Source: socprime.com - Author: John Stevens [post-views] November 27, 2024 · 2 min read When you...
Posts pagination
1
…
8
9
10
11
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025