Detection Content to Address Attacker Techniques Covered in the “Domain of Thrones: Part I” Research
Offensive forces continuously look for new ways to gain access to the domain environment and sustain their presence by leveraging…
Offensive forces continuously look for new ways to gain access to the domain environment and sustain their presence by leveraging…
Adding to the list of critical Citrix NetScaler zero-days, security researchers warn of a new dangerous vulnerability (CVE0-2023-4966) continuously exploited…
Microsoft 365 (M365) is leveraged by over a million global companies, which can pose severe threats to the customers relying…
Hard on the heels of a new surge in the long-running Balada Injector campaign exploiting CVE-2023-3169, another critical security bug…
Meet the new Threat Bounty Program digest that covers the recent news and updates of SOC Prime’s crowdsourced detection engineering…
CERT-UA researchers notify defenders of the persistent malicious campaign impacting more than 11 telecom providers. The UAC-0165 group behind these…
Over a month ago, defenders warned the peer community of CVE-2023-4634, a critical WordPress vulnerability actively exploited in the wild…
How Automation Technology is Reshaping Stress Management in Security Operations Before getting into cybersecurity, did you think of yourself as…
Novel LostTrust ransomware emerged in the cyber threatscape in early spring 2023. However, the adversary campaign hit the headlines only…
In early October 2023, the UAC-0006 group was observed behind a series of at least four cyber attacks targeting Ukraine,…