Tag: Google SecOps

IOC Intelligence to Google SecOps: Automated Conversion with Uncoder AI
IOC Intelligence to Google SecOps: Automated Conversion with Uncoder AI

How It Works This Uncoder AI feature processes structured threat reports, such as those in IOC (Indicators of Compromise) format, and automatically transforms them into actionable detection logic. The screenshot illustrates: Left Panel: A classic threat intelligence report under the “COOKBOX” campaign, showing extracted hashes, domains, IPs, URLs, and registry keys associated with malicious PowerShell […]

Read More
AI-Validated Hostname Filtering for Chronicle Queries
AI-Validated Hostname Filtering for Chronicle Queries

How It Works This Uncoder AI feature showcases its ability to analyze and validate Chronicle UDM queries involving multiple domain-based conditions. In this example, Uncoder AI processes a threat-hunting query associated with Sandworm (UAC-0133) activity, which targets a set of .sh and .so domains. The platform automatically identifies that the detection logic uses a field-level […]

Read More
IOC-to-Query Generation for Google SecOps (Chronicle) in Uncoder AI
IOC-to-Query Generation for Google SecOps (Chronicle) in Uncoder AI

How It Works 1. IOC Extraction from Threat Reports Uncoder AI automatically parses structured threat reports to extract: Domains and subdomains (e.g., mail.zhblz.com, doc.gmail.com.gyehdhhrggdi…) URLs and paths from phishing and payload delivery servers Related IPs, hashes, and filenames (seen on the left) This saves significant manual effort compared to copying and normalizing IOCs from multiple […]

Read More
Rule Deployment into a Data Plane
Rule Deployment into a Data Plane

How It Works Uncoder AI supports native integration with Microsoft Sentinel, Google SecOps, and Elastic Stack, enabling users to deploy detection rules directly from the platform. Once a rule is authored or translated within Uncoder AI, the user can instantly push it into their SIEM’s data plane without exporting files or manual upload. In the […]

Read More
Visualizing Sensitive File Discovery in Google SecOps with Uncoder AI’s Decision Tree
Visualizing Sensitive File Discovery in Google SecOps with Uncoder AI’s Decision Tree

In today’s hybrid environments, legitimate tools like Notepad can be silently used to view or stage sensitive data such as password files—especially by insiders or low-and-slow threat actors. While Google SecOps (UDM) supports highly specific detections, the logic behind them is often layered and complex. That’s why Uncoder AI’s AI-generated Decision Tree has become an […]

Read More