Tag: SOC Prime Platform

ProxyNotShell: Detecting CVE-2022-41040 and CVE-2022-41082, Novel Microsoft Exchange Zero-Day Vulnerabilities Actively Exploited in the Wild 3 min read Latest Threats ProxyNotShell: Detecting CVE-2022-41040 and CVE-2022-41082, Novel Microsoft Exchange Zero-Day Vulnerabilities Actively Exploited in the Wild by Veronika Telychko NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once 3 min read Latest Threats NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once by Veronika Telychko Top Challenges for MSSPs and MDRs and How to Overcome Them 8 min read SIEM & EDR Top Challenges for MSSPs and MDRs and How to Overcome Them by Oleksandra Rumiantseva What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001 13 min read SIEM & EDR What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001 by Karolina Koval Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover 3 min read Latest Threats Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover by Anastasiia Yevdokimova SOC Prime Threat Bounty — August 2022 Results 3 min read SOC Prime Threat Bounty — August 2022 Results by Alla Yurchenko Golang Attack Campaign Tracked as GO#WEBBFUSCATOR Applies James Webb Space Telescope Images as Lures to Infect Systems 3 min read Latest Threats Golang Attack Campaign Tracked as GO#WEBBFUSCATOR Applies James Webb Space Telescope Images as Lures to Infect Systems by Veronika Telychko What Is the MITRE ATT&CK® Framework? Getting Started with ATT&CK 13 min read SIEM & EDR What Is the MITRE ATT&CK® Framework? Getting Started with ATT&CK by Karolina Koval AgentTesla Spyware Massively Distributed in Phishing Campaigns Targeting Ukrainian, Austrian, and German Organizations 3 min read Latest Threats AgentTesla Spyware Massively Distributed in Phishing Campaigns Targeting Ukrainian, Austrian, and German Organizations by Veronika Telychko HYPERSCRAPE Detection: Iranian Cyberespionage Group APT35 Uses a Custom Tool to Steal User Data 3 min read Latest Threats HYPERSCRAPE Detection: Iranian Cyberespionage Group APT35 Uses a Custom Tool to Steal User Data by Veronika Telychko