Platform
Threat Detection Marketplace
Your Home for Threat Detection
Attack Detective
Industry-First SaaS for Advanced Threat Hunting
Uncoder AI
Single IDE for Detection Engineering
DetectFlow
Data pipeline for routing detections
Ecosystem
Use Cases
Fortify SIEM Posture
Audit your SIEM posture to maximize threat visibility & address detection coverage gaps.
Obtain Rules for Alerting
Get prioritized SIEM use cases ready-to-deploy as low-noise and high-value alerts.
Advance Threat Detection
Access the world’s largest rule feed for emerging threats, manage & deploy detections at scale.
Elevate Detection Engineering
Save time and costs, obtain CTI-enriched use cases, adapt CI/CD workflows.
Accelerate MDR Services
Reduce customer churn, address technical debt in threat detection, and save on SIEM costs.
Hyperscale SIEM Migration
Accelerate time-to-value and maximize the ROI of your SIEM migration project.
Services
Professional Services Overview
Explore our on-demand services and training.
MITRE ATT&CK Audit
Minimize blind spots and ensure comprehensive data visibility.
Custom Content Engineering
Adopt out-of-the-box detection engineering capability to identify threats challenging your business.
SIEM Migration Services
Accelerate time-to-value and maximize the ROI of your SIEM migration project.
Resources
Blog
Research, guides, interviews
Events
Stay tuned to our cybersecurity events
Data Sheets
Explore our data sheets for detailed insights
Active Threats
Get detection code and simulations
Customer Success Stories
Learn how global organizations trust SOC Prime
Detection as Code
Explore our latest innovation reports
Roota
Open-Source Language for Collective Cyber Defence
Sigma
History of Sigma Evolution
Industry Expertise
Center of Excellence for Microsoft Sentinel
Center of Excellence for Amazon Web Services
Splunk Migration & Support
Tools
Uncoder.IO
The Prime Hunt browser extension:
Chrome
Firefox
Edge
Company
Why SOC Prime?
Collective cyber defense for a secure tomorrow
About Us
Our story and mission
Industry Recognition
Verified value for cybersecurity
Leadership
Biography and DNA
Careers
Job opportunities at SOC Prime
Privacy
SOC Prime’s privacy-centric mindset
SOC 2 Type II Compliance
Benchmark for security compliance
Partner Programs for Universities
Sigma & MITRE ATT&CK® Education
Log In
View intelligence
View intelligence
View intelligence
←
Back to Blog
Tag: Decision Tree
Apr. 24/2025
4 min zu lesen
SOC Prime Plattform
Visualisierung der Entdeckung sensibler Dateien in Google SecOps mit dem Entscheidungsbaum von Uncoder AI
by Steven Edwards
Search:
Follow us on:
Archive
April 2026 (1)
März 2026 (9)
Februar 2026 (9)
Januar 2026 (10)
Dezember 2025 (8)
November 2025 (7)
Oktober 2025 (17)
September 2025 (11)
August 2025 (9)
Juli 2025 (13)
Juni 2025 (29)
Mai 2025 (20)
April 2025 (36)
März 2025 (13)
Februar 2025 (15)
Januar 2025 (16)
Dezember 2024 (23)
November 2024 (12)
Oktober 2024 (16)
September 2024 (12)
August 2024 (12)
Juli 2024 (16)
Juni 2024 (14)
Mai 2024 (12)
April 2024 (16)
März 2024 (9)
Februar 2024 (12)
Januar 2024 (10)
Dezember 2023 (11)
November 2023 (12)
Oktober 2023 (12)
September 2023 (15)
August 2023 (9)
Juli 2023 (13)
Juni 2023 (14)
Mai 2023 (13)
April 2023 (8)
März 2023 (10)
Februar 2023 (12)
Januar 2023 (11)
Dezember 2022 (9)
November 2022 (8)
Oktober 2022 (9)
September 2022 (25)
August 2022 (26)
Juli 2022 (28)
Juni 2022 (29)
Mai 2022 (33)
April 2022 (35)
März 2022 (33)
Februar 2022 (11)
Januar 2022 (7)
Dezember 2021 (6)
November 2021 (7)
Oktober 2021 (11)
September 2021 (3)
August 2021 (3)
Juli 2021 (7)
Juni 2021 (9)
Mai 2021 (10)
April 2021 (12)
März 2021 (8)
Februar 2021 (10)
Januar 2021 (15)
Dezember 2020 (10)
November 2020 (2)
Oktober 2020 (8)
September 2020 (15)
August 2020 (20)
Juli 2020 (26)
Juni 2020 (22)
Mai 2020 (28)
April 2020 (12)
März 2020 (4)
Januar 2020 (2)
Dezember 2019 (1)
November 2019 (1)
Oktober 2019 (3)
September 2019 (1)
August 2019 (1)
Juli 2019 (2)
Juni 2019 (1)
Mai 2019 (1)
Oktober 2018 (1)
August 2018 (1)
Februar 2018 (1)
November 2017 (5)
Oktober 2017 (8)
September 2017 (1)
August 2017 (5)
Juli 2017 (5)
Mai 2017 (1)
Dezember 2016 (2)
Juli 2016 (1)
Mai 2016 (2)
März 2016 (3)
Februar 2016 (1)
Januar 2016 (1)
Dezember 2015 (3)
November 2015 (3)
Tags
Adam Swan
AI
AI SOC Ecosystem
AI-generated Decision Tree
Apache Kafka
APT
APT28
APT44
ArcSight
Ariel Millahuel
Arunkumar Krishna
Authentication Bypass
AWS
AWS WAF
Aytek Aytemur
Botnet
Cactus Ransomware
CCM
CERT-UA
CERTUA
China Chopper
Chinese APT Actors
Chronicle UDM
CI/CD
CISA
CISA Alert
Community
Correlation
CTI
CVE
CVE-2025-21298
CVE-2025-31324
CVE-2025-8088
CVE-2026-21509
Cyber-espionage
Cyberattack
cyberwar
DarkCrystal RAT
DARKCRYSTALRAT
Davut Selcuk
DDoS
Den Iuzvyk
DetectFlow
Detection Content
Elastic
Elasticsearch
Elevation of Privileges
ELKStack
Emanuele De Lucia
Emir Erdogan
Events
Exploit
False positive
Fancy Bear
FIN7
Full Summary
Furkan Celik
Gamaredon
GenAI
Generative AI
Google Chrome
Google Chrome Vulnerability
Google SecOps
Halil Ibrahim Cosgun
How to
Infostealer
Integration
Interview
Investigation
IOC
IOC Rule
Kafka
Kimsuky
KQL
Kusto
Kyaw Pyiyt Htet
Latest threats
Lazarus
Lee Archinal
LLM
LockBit
Log Management
MaaS
macOS
Malware
Microsoft Defender for Endpoint
Microsoft Sentinel
Microsoft Vulnerability
Microsoft Zero-Day
MITRE ATT&CK
Mustafa Gurkan KARAKAYA
Mustang Panda
Nattatorn Chuensangarun
netconn_domain
Observability
Onur Atali
OpenSearch
Osman Demir
Phishing
PlugX
Privilage Escalation
privilege escalation
QRadar
RaaS
RansomHub
Ransomware
RAT
RCE
Roman Ranskyi
RomCom
Roota
Rule Digest
Rule of the Week
Rules
russianagression
Sandworm
SDPP
Seashell Blizzard
Secret Blizzard
Security Data Pipeline Platform
SentinelOne detection
Shift-Left Threat Detection
SIEM
SIEM & EDR
Sigma
Sittikorn
Sittikorn Sangrattanapitak
SmokeLoader
SOC Prime
SOC Prime Platform
SOC Prime Team
SOC Prime Team Stories
SolarWinds
Splunk
Splunk SPL
Sreeman Shanker
Supply Chain Attack
TDM
The Prime Hunt
Threat Bounty Program
Threat Detection Marketplace
Threat Hunting
Threat Hunting Content
Threat Intelligence
Threatintel
ThreatIntelligence
TopCVE2023
Turla
Uncoder
Uncoder AI
Uncoder CTI
Use Case
Vulnerability
WAF
Wirapong Petshagun
Zero-click
Zero-Day
ZeroDay