• Platform
    • Threat Detection Marketplace Your Home for Threat Detection
    • Attack Detective Industry-First SaaS for Advanced Threat Hunting
    • Uncoder AI Single IDE for Detection Engineering
    • DetectFlow Data pipeline for routing detections
  • Ecosystem
  • Use Cases
    • Fortify SIEM Posture Audit your SIEM posture to maximize threat visibility & address detection coverage gaps.
    • Obtain Rules for Alerting Get prioritized SIEM use cases ready-to-deploy as low-noise and high-value alerts.
    • Advance Threat Detection Access the world’s largest rule feed for emerging threats, manage & deploy detections at scale.
    • Elevate Detection Engineering Save time and costs, obtain CTI-enriched use cases, adapt CI/CD workflows.
    • Accelerate MDR Services Reduce customer churn, address technical debt in threat detection, and save on SIEM costs.
    • Hyperscale SIEM Migration Accelerate time-to-value and maximize the ROI of your SIEM migration project.
  • Services
    • Professional Services Overview Explore our on-demand services and training.
    • MITRE ATT&CK Audit Minimize blind spots and ensure comprehensive data visibility.
    • Custom Content Engineering Adopt out-of-the-box detection engineering capability to identify threats challenging your business.
    • SIEM Migration Services Accelerate time-to-value and maximize the ROI of your SIEM migration project.
  • Resources
    • Blog Research, guides, interviews
    • Events Stay tuned to our cybersecurity events
    • Data Sheets Explore our data sheets for detailed insights
    • Active Threats Get detection code and simulations
    • Customer Success Stories Learn how global organizations trust SOC Prime
    • Detection as Code Explore our latest innovation reports
    • Roota Open-Source Language for Collective Cyber Defence
    • Sigma History of Sigma Evolution
    • Industry Expertise
    • Center of Excellence for Microsoft Sentinel
    • Center of Excellence for Amazon Web Services
    • Splunk Migration & Support
    • Tools
    • Uncoder.IO
    • The Prime Hunt browser extension:
      Chrome
      Firefox
      Edge
  • Company
    • Why SOC Prime? Collective cyber defense for a secure tomorrow
    • About Us Our story and mission
    • Industry Recognition Verified value for cybersecurity
    • Leadership Biography and DNA
    • Careers Job opportunities at SOC Prime
    • Privacy SOC Prime’s privacy-centric mindset
    • SOC 2 Type II Compliance Benchmark for security compliance
    • Partner Programs for Universities Sigma & MITRE ATT&CK® Education
  • Log In
  • View intelligence
View intelligence
  • View intelligence

  • En
  • Pt
  • Ja
  • De
  • Ko
  • It
  • Fr
Detección del ataque de UAC-0255: actores de amenazas suplantan a CERT-UA para infectar a organizaciones del sector público y privado de Ucrania con el troyano de acceso remoto AGEWHEEZE (RAT) Abr 1/2026 5 min de lectura Últimas Amenazas Detección del ataque de UAC-0255: actores de amenazas suplantan a CERT-UA para infectar a organizaciones del sector público y privado de Ucrania con el troyano de acceso remoto AGEWHEEZE (RAT) by Daryna Olyniychuk
Pipeline de telemetría: cómo funciona y por qué es importante en 2026 Mar 25/2026 15 min de lectura SIEM y EDR Pipeline de telemetría: cómo funciona y por qué es importante en 2026 by Steven Edwards CVE-2026-20643: Vulnerabilidad en la API de navegación de WebKit puede eludir la política del mismo origen Mar 18/2026 5 min de lectura Últimas Amenazas CVE-2026-20643: Vulnerabilidad en la API de navegación de WebKit puede eludir la política del mismo origen by Daryna Olyniychuk Canal de Observabilidad: Gestión de Telemetría a Gran Escala Mar 18/2026 10 min de lectura SIEM y EDR Canal de Observabilidad: Gestión de Telemetría a Gran Escala by Steven Edwards CVE-2026-3910: Día Cero de Chrome V8 Usado para Ataques en la Naturaleza Mar 13/2026 5 min de lectura Últimas Amenazas CVE-2026-3910: Día Cero de Chrome V8 Usado para Ataques en la Naturaleza by Daryna Olyniychuk
  • Todas las Categorías
  • Noticias
  • Plataforma SOC Prime
  • Sigma
  • SIEM y EDR
  • CVEs
  • Entrevista
  • Fragmentos de Conocimiento

    Descubre Más de SOC Prime

    Mejor Experiencia para Practicantes de Seguridad
        
                                            el Mercado de Detección de Amenazas                                        el Mercado de Detección de Amenazas
    Your Home for Threat Detection
        
                                            Attack Detective                                        Attack Detective
    Industry-First SaaS for Advanced Threat Hunting
        
                                            Uncoder AI                                        Uncoder AI
    Single IDE for Detection Engineering
        
                                            Professional Services Overview                                        Professional Services Overview
    Explore our on-demand services and training

    Impulsa tu ciberdefensa con el Mercado de Detección de Amenazas

    La plataforma líder para la Detección como Código e Inteligencia de Seguridad Continua
    Únete ahora
    • Platform
    • Threat Detection Marketplace
    • Attack Detective
    • Uncoder AI
    • DetectFlow
    • Ecosystem
    • Use Cases
    • Fortify SIEM Posture
    • Obtain Rules for Alerting
    • Advance Threat Detection
    • Elevate Detection Engineering
    • Accelerate MDR Services
    • Hyperscale SIEM Migration
    • Services
    • Professional Services Overview
    • MITRE ATT&CK Audit
    • Custom Content Engineering
    • SIEM Migration Services
    • Industry Expertise
    • Center of Excellence for Microsoft Sentinel
    • Center of Excellence for Amazon Web Services
    • Splunk Migration & Support
    • Tools
    • Uncoder.IO
    • The Prime Hunt for:
    • Chrome Firefox Edge
    • Resources
    • Blog
    • Events
    • Data Sheets
    • Active Threats
    • Customer Success Stories
    • Detection as Code
    • Roota
    • Sigma
    • Company
    • Why SOC Prime?
    • About Us
    • Industry Recognition
    • Leadership
    • Careers
    • Privacy
    • SOC 2 Type II Compliance
    • Partner Programs for Universities
    • Change consent settings
    • Cookie Policy
    • Privacy Policy
    • LEGAL NOTICE (IMPRESSUM)
    • SOC PRIME PLATFORM TERMS OF SERVICE
    • Privacy FAQ
    Engage WIth Us
    • discord
    • github
    • youtube
    • linkedin
    • facebook
    • twitter
    • bluesky

    SOC Prime, SOC Prime Logo and Threat Detection Marketplace are registered trademarks of SOC Prime, Inc. All other trademarks are the property of their respective owners.