Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
socprime
socprime
Raspberry Robin Malware Detection: New Connections Revealed
Raspberry Robin Malware Detection: New Connections Revealed In late July, Microsoft researchers released new evidence linking...
socprime
What Is the MITRE ATT&CK® Framework? Getting Started with ATT&CK
What Is the MITRE ATT&CK® Framework? Getting Started with ATT&CK MITRE ATT&CK® is a framework for...
socprime
AgentTesla Spyware Massively Distributed in Phishing Campaigns Targeting Ukrainian, Austrian, and German Organizations
AgentTesla Spyware Massively Distributed in Phishing Campaigns Targeting Ukrainian, Austrian, and German Organizations On August 30...
socprime
ModernLoader Bot Detection: Spreads via Bogus Amazon Gift Cards, Compromises Users in Eastern Europe
ModernLoader Bot Detection: Spreads via Bogus Amazon Gift Cards, Compromises Users in Eastern Europe ModernLoader bot,...
socprime
Genshin Impact Ransomware Infection: Adversaries Abuse the Anti-Cheat Driver
Genshin Impact Ransomware Infection: Adversaries Abuse the Anti-Cheat Driver Genshin Impact, a popular open-world action RPG,...
socprime
HYPERSCRAPE Detection: Iranian Cyberespionage Group APT35 Uses a Custom Tool to Steal User Data
HYPERSCRAPE Detection: Iranian Cyberespionage Group APT35 Uses a Custom Tool to Steal User Data The malicious...
socprime
MagicWeb Detection: NOBELIUM APT Uses Sophisticated Authentication Bypass
MagicWeb Detection: NOBELIUM APT Uses Sophisticated Authentication Bypass A notorious APT group tracked as NOBELIUM (aka...
socprime
What Is Malware? Malware Types to Watch Out For
What Is Malware? Malware Types to Watch Out For Malware stands for malicious software and denotes...
socprime
HavanaCrypt Ransomware Detection: New Ransomware Family Wreaks Havoc
HavanaCrypt Ransomware Detection: New Ransomware Family Wreaks Havoc A new ransomware package dubbed HavanaCrypt quickly catapulted...
socprime
PyPi Malware Detection: Stealing Discord Tokens to Spread Malware
PyPi Malware Detection: Stealing Discord Tokens to Spread Malware Earlier this month, security researchers identified PyPi...
socprime
What is Malware Analysis?
What is Malware Analysis? Lots of children break things not because they are little evil creatures...
socprime
LTI
LTI The post LTI appeared first on SOC Prime. Leer másSOC Prime The post LTI appeared...
socprime
Redeemer Ransomware Detection: New Version Distributed on Underground Forums
Redeemer Ransomware Detection: New Version Distributed on Underground Forums The Redeemer ransomware builder’s author put a...
socprime
BlueSky Ransomware Detection: Targets Windows Hosts and Leverages Multithreading for Faster Encryption
BlueSky Ransomware Detection: Targets Windows Hosts and Leverages Multithreading for Faster Encryption BlueSky ransomware represents a...
socprime
Zeppelin Ransomware Detection: CISA and FBI Issue a Joint Advisory for Enhanced Protection Against RaaS Threats
Zeppelin Ransomware Detection: CISA and FBI Issue a Joint Advisory for Enhanced Protection Against RaaS Threats...
socprime
Product Adoption Specialist (US)
Product Adoption Specialist (US) Our Perfect Candidate You are highly disciplined, self-motivated, and influential. You have...
socprime
Detecting SEABORGIUM Campaigns: A Cyberespionage Group Targeting Governments, Military, and NGOs Across Europe
Detecting SEABORGIUM Campaigns: A Cyberespionage Group Targeting Governments, Military, and NGOs Across Europe Cybersecurity experts from...
socprime
SOC Prime Threat Bounty — July 2022 Results
SOC Prime Threat Bounty — July 2022 Results July ‘22 Updates During the previous month, we...
socprime
What is Cyber Threat Hunting? The Ultimate Guide
What is Cyber Threat Hunting? The Ultimate Guide Cyber Threat Hunting is a novel approach to...
socprime
Threat Hunting Hypothesis Examples: Prepare For a Good Hunt!
Threat Hunting Hypothesis Examples: Prepare For a Good Hunt! A good threat hunting hypothesis is key...
socprime
Cuba Ransomware Detection: Tropical Scorpius Threat Actors Deploy Novel RAT Malware in Targeted Attacks
Cuba Ransomware Detection: Tropical Scorpius Threat Actors Deploy Novel RAT Malware in Targeted Attacks High-profile ransomware...
socprime
Armageddon APT aka UAC-0010 Uses GammaLoad and GammaSteel Malware in Targeted Cyber-Attacks on Ukraine
Armageddon APT aka UAC-0010 Uses GammaLoad and GammaSteel Malware in Targeted Cyber-Attacks on Ukraine With the...
socprime
Cisco Hacked by Yanluowang: Detect Relevant Malicious Activity With Sigma Rules Kit
Cisco Hacked by Yanluowang: Detect Relevant Malicious Activity With Sigma Rules Kit On August 10, 2022,...
socprime
Sales Director – Federal (US)
Sales Director – Federal (US) Our Perfect Candidate You are a self-starter with strong attention to...
socprime
Sales Director – Government (US)
Sales Director – Government (US) Our Perfect Candidate You are a self-starter with strong attention to...
socprime
SOC Prime Announces the Appointment of New Chief Operating Officer to Strengthen Its Executive Team
SOC Prime Announces the Appointment of New Chief Operating Officer to Strengthen Its Executive Team SOC...
socprime
CVE-2022-30333 Detection: New Security Hole in the UnRAR Utility
CVE-2022-30333 Detection: New Security Hole in the UnRAR Utility The US Critical Infrastructure Security Agency (CISA)...
Posts navigation
1
…
3
4
Latest News
securityweek.com
SAP Patches High-Severity Vulnerabilities in Commerce, NetWeaver – Source: www.securityweek.com
11/03/2025
securityweek.com
Edimax Says No Patches Coming for Zero-Day Exploited by Botnets – Source: www.securityweek.com
11/03/2025
securelist.com
DCRat backdoor returns – Source: securelist.com
11/03/2025
Krebs On Security
Alleged Co-Founder of Garantex Arrested in India – Source: krebsonsecurity.com
11/03/2025
The Hacker News
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks – Source:thehackernews.com
11/03/2025
The Hacker News
Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices – Source:thehackernews.com
11/03/2025