Year: 2017

Attack on Financial Institutions with a New Backdoor
Attack on Financial Institutions with a New Backdoor

London, UK – August 08, 2017 – There were at least five attacks on Russian-speaking companies between June 23 and July 27, as researchers from Trend Micro reported. The primary targets of these attacks were banks and mining companies.

Read More
Creating Correlation Events in Splunk using Alerts
Creating Correlation Events in Splunk using Alerts

Many SIEM users ask a question: How do Splunk and HPE ArcSight SIEM tools differ? ArcSight users are confident that correlation events in ArcSight are a weighty argument in favor in using this SIEM because Splunk does not have the same events. Let’s destroy this myth. Splunk has many options to correlate events. So in […]

Read More
Additional Data in ArcSight ESM
Additional Data in ArcSight ESM

Everyone who had ever installed a single ArcSight SmartConnector knows about ‘Device Event Mapping to ArcSight Fields’ chapter in the installation guide where you can find information on mapping of Device-Specific fields to ArcSight Event Scheme. It’s an essential chapter for Analysts, right? Certainly, you noticed that for some SmartConnectors there are ‘Additional Data’ fields. […]

Read More
PT Korelasi Persada Indonesia becomes SOC Prime’s partner
PT Korelasi Persada Indonesia becomes SOC Prime’s partner

London, UK – August 03, 2017 – SOC Prime, Inc. announces a new partnership with PT Korelasi Persada Indonesia to bring innovation and efficiency for next generation Managed Security Services and MDR.

Read More
What is network hierarchy and how to use it in IBM QRadar
What is network hierarchy and how to use it in IBM QRadar

Network hierarchy is a description of the internal model of organization’s network. The network model allows you to describe all internal segments of the network including server segment, DMZ, user segment, Wi-Fi and so on. This data is necessary to enrich the data of registered Offenses; you can use the network model data in rules, […]

Read More
Active Lists in ArcSight, automatic clearing. Part 1
Active Lists in ArcSight, automatic clearing. Part 1

ArcSight beginners and experienced users very often face a situation when they need to automatically clear Active List in a use case. It could be the following scenario: count today’s logins for every user in real-time or reset some counters that are in Active List at the specified time.

Read More
Historical Correlation
Historical Correlation

What if I deployed or designed new Use Case and I want to know if my company was exposed to the threat in the past? While working with ArcSight a lot of people are wondering whether there is a way to realize historical correlation. They even have several real life scenarios for this. The first […]

Read More
How to fix parsing issues in QRadar without technical support
How to fix parsing issues in QRadar without technical support

All QRadar products can be divided into two groups: versions before 7.2.8 and all newest versions. In 7.2.8+ QRadar versions, all parsing changes are performed from the WEB console. To fix a parsing issue, you need to do the following steps: Create Search on Log Activity page in QRadar where you can get events with […]

Read More
CowerSnail – a three-megabyte backdoor
CowerSnail – a three-megabyte backdoor

London, UK – July 27, 2017 – At the end of May, researchers from Kaspersky Lab discovered a SambaCry cryptocurrency miner for *nix systems, which exploited the EternalRed vulnerability. Soon they captured malware for Windows that was probably created by the same group (since both malware types used the same C2 server).

Read More
Deliver TI feeds into ArcSight without false positive triggers
Deliver TI feeds into ArcSight without false positive triggers

Every ArcSight user or administrator is faced with false positive rule triggers while delivering threat intelligence feed into ArcSight. This mostly happens when threat intel source events are not excluded from rule condition or connector tries to resolve all IP addresses and host names that are processed.

Read More