Threats

SOC Prime Threat Bounty Digest — November 2023 Results

Threat Bounty Content We continue aligning the efforts with Threat Bounty Program members in enriching the SOC Prime Platform with actionable detection content for behavior detection rules. In today’s rapidly changing threat landscape, security professionals leveraging the SOC Prime Platform to defend their corporate environments rely upon SIEM content that is capable of detecting behavioral […]

The post SOC Prime Threat Bounty Digest — November 2023 Results appeared first on SOC Prime.

Cybersecurity Tools

Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics

Overview: Batloader is not a new malware in the series – it is an emerging one. In our previous blogs, we discussed how Batloader can deploy different types of malware, including stealers and ransomware. We also delved into its role as an initial access gainer, and highlighted its highly evasive nature, along with its ability […]

The post Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

Cybersecurity Tools

Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities

By Julie Taylor, Tech Principal, Joyn Holdings LTD & Jacob Dahlman, Team Lead, Joyn Holdings LTD In an increasingly digital world, the safety of our children on the internet has […]

The post Safeguarding Children and Vulnerable Groups Online Strategies for Enhancing Online Safety in Digital Communities appeared first on Cyber Defense Magazine.

Scroll to Top