Investigating Curl-Based TOR Proxy Access with Uncoder AI and SentinelOne Query Language
Detecting stealthy command-line activity that may indicate dark web access or anonymized traffic is a growing challenge for security teams.…
Detecting stealthy command-line activity that may indicate dark web access or anonymized traffic is a growing challenge for security teams.…
ESET’s Q2-Q3 2024 APT Activity Report highlights China-affiliated groups leading global APT operations, with campaigns aimed at intelligence gathering being…
In the world of Security Operations, speed and clarity are everything. When analysts sift through complex detection logic—especially in extensive…
Modern SOC teams dealing with Splunk Detections need to process large volumes of detection logic written in SPL. The challenge?…
A critical vulnerability in the widely used Gladinet CentreStack and Triofox enterprise file sharing and remote access platforms has surfaced…
Hot on the heels of the CVE-2025-1449 disclosure, a vulnerability in Rockwell Automation software, another critical security issue affecting widely…
Throughout March 2025, defenders observed increasing cyber-espionage activity by the UAC-0219 hacking group targeting Ukrainian critical sectors WRECKSTEEL malware. In…
A nefarious russia’s APT group Seashell Blizzard also known as APT44 has been waging global cyber campaigns since at least…
In late March 2025, CERT-UA observed a surge in cyber-espionage operations targeting Ukraine, orchestrated by the UAC-0200 hacking group using…
Hard on the heels of the disclosure of CVE-2025-24813, a RCE flaw in Apache Tomcat actively leveraged in the wild…