News & Updates

THN Recap: Top Cybersecurity Threats, Tools and Tips (Nov 25 – Dec 1)

Ever wonder what happens in the digital world every time you blink? Here’s something wild – hackers launch about 2,200 attacks every single day, which means someone’s trying to break into a system somewhere every 39 seconds.
And get this – while we’re all worried about regular hackers, there are now AI systems out there that can craft phishing emails so convincingly, that even cybersecurity
News & Updates

Interpol: Operation HAECHI-V led to more than 5,500 suspects arrested

International law enforcement operation Operation HAECHI-V led to more than 5,500 suspects arrested and seized over $400 million. A global operation code-named Operation HAECHI V, involving 40 countries, resulted in 5,500+ arrests and seized $400M in assets. Operation HAECHI V (July-Nov 2024) targeted cyber frauds like phishing, romance scams, sextortion, investment fraud, online gambling, BEC, […]
Threats

Configuring Elasticsearch Authentication with LDAPS

LDAP (Lightweight Directory Access Protocol) is a popular method for centralizing user authentication and access control across an organization. Configuring Elasticsearch to use LDAP over a secure connection (LDAPS) adds an additional layer of security by encrypting communication between Elasticsearch and the LDAP server. This article provides a step-by-step guide to setting up LDAPS for […]

The post Configuring Elasticsearch Authentication with LDAPS appeared first on SOC Prime.

News & Updates

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

Over a dozen malicious Android apps identified on the Google Play Store that have been collectively downloaded over 8 million times contain malware known as SpyLoan, according to new findings from McAfee Labs.
“These PUP (potentially unwanted programs) applications use social engineering tactics to trick users into providing sensitive information and granting extra mobile app permissions, which
Threats

Get started with ISM (Index State Management)

To start with Index State Management, first of all, you need to set up policies.You can use Visual Editor or Dev-tools. If you choose Visual Editor, then do the following:In Index Management > State management policies, choose Create policy and click Continue: Inside the Create policy, you need to set the policy info:        Policy ID       Description (optional) Set Error […]

The post Get started with ISM (Index State Management) appeared first on SOC Prime.

News & Updates

INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

A global law enforcement operation has led to the arrest of more than 5,500 suspects involved in financial crimes and the seizure of more than $400 million in virtual assets and government-backed currencies.
The coordinated exercise saw the participation of authorities from 40 countries, territories, and regions as part of the latest wave of Operation HAECHI-V, which took place between July and
News & Updates

How threat actors can use generative artificial intelligence?

Generative Artificial Intelligence (GAI) is rapidly revolutionizing various industries, including cybersecurity, allowing the creation of realistic and personalized content. The capabilities that make Generative Artificial Intelligence a powerful tool for progress also make it a significant threat in the cyber domain. The use of GAI by malicious actors is becoming increasingly common, enabling them to […]
Exit mobile version