Month: May 2017

Visit us at the Satisnet booth (D245) at Infosecurity Europe on 06-08 June 2017!

London, UK – May 30, 2017 – SOC Prime, Inc. reports that you can find us and our partner, Satisnet, at Infosecurity Europe at booth D245. Visit us and talk with our ArcSight and QRadar experts to learn how to increase the efficiency of your SOC. Ask any questions and get acquainted with our products. […]

Read More
EternalRocks Worm Detector SIEM Use Case

London, UK – May 25, 2017 – SOC Prime, Inc. reports on public availability of SIEM use cases for EternalRocks detection. Based on the information gathered by Miroslav Stampar, expert of the Croatian Government CERT, we created EternalRocks Worm Detector for HPE ArcSight, IBM QRadar and Splunk. EternalRocks is the more sophisticated successor to the […]

Read More
WannaCry no more: ransomware worm IOC’s, Tor C2 and technical analysis + SIEM rules

Good news everyone! After a rather long day, night and morning of studying the news, researching and hunting the #WannaCry ransomwareworm there are some discoveries to be shared.. This includes Host and Network IOCs, their analysis obtained with help of fellow security researchers and practitioners, review of C2 infrastructure and its interactions with Tor. Last but not least are some free SIEM use cases that […]

Read More
Predictive Maintenance 3.4.1 is released!

London, UK – May 11, 2017 – SOC Prime, Inc. announces a release of the new version of Predictive Maintenance (https://socprime.com/en/predictive-maintenance/) platform for HPE ArcSight. We are constantly working on making our platform as functional as possible and providing information security experts with all the necessary tools. In Predictive Maintenance 3.4.1, we have added the […]

Read More
SOC Prime reveals Security Management Assistance Cloud

London, UK – May 5, 2017 – As we explore benefits of interconnected digital world every organization faces more and more cyber security risks. Many of us invested into solid security technologies such as SIEM, Vulnerability Management, Threat Intelligence and built Security Operation Centers. A question that remains is how do we use them to […]

Read More