Detecting Network Spikes Identified by WAF for the Elastic Stack Platform
There are a lot of interesting cases that you can find while investigating anomalies in the traffic baselines, for example,…
There are a lot of interesting cases that you can find while investigating anomalies in the traffic baselines, for example,…
Security researchers have issued a stark warning about a critical vulnerability, designated as CVE-2023-4634, which is affecting an alarming number…
CVE-2023-4634, which is affecting an alarming number of over 70,000 WordPress sites globally. This vulnerability originates from a security flaw…
The financial sector, the keystone of the global economy, has become increasingly digitized in recent years. While this transformation brings…
At the turn of fall 2023, the russia-backed APT28 hacking group reemerges in the cyber threat arena, targeting the critical…
This guide describes how to deploy Content Packs for QRadar based on the recommended example of the “SOC Prime –…
The UAC-0057 hacking collective, aka GhostWriter, reemerges in the cyber threat arena by abusing a WinRAR zero-day tracked as CVE-2023-38831…
Adversaries weaponize four newly discovered RCE security flaws in the J-Web component of Junos OS tracked as CVE-2023-36844, CVE-2023-36845, CVE-2023-36846,…
Cybersecurity experts observe significantly growing volumes of malicious activity aimed at targeting Ukrainian public and private sectors, with offensive forces…
In February 2023, SOC Prime launched its Discord server community connecting aspiring cybersecurity enthusiasts and seasoned experts in a single…